Cryptography

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 25

BLOCK CHAIN

TECHNOLOGY
DECENTRALIZATION AND ENCRYPTION
CRYTPOGRAPHY NEED
CLASS PARTICIPATION:
CRYTPOGRAPHY
• Cryptography is the science of making information secure in the presence of
adversaries.

• Ciphers are used to encrypt data so that if intercepted by an adversary, the data is
meaningless to them without decryption, which requires the secret key.

• Cryptography is generally used to provide a confidentiality service.


• Cryptography provides various security services, such as Confidentiality, Integrity,
Authentication, (Entity Authentication and Data origin authentication) and non
repudiation.
Features Of Cryptography are as
follows:
• Confidentiality:
Information can only be accessed by the person for whom it is intended and
no other person except him can access it.
• Integrity:
Information cannot be modified in storage or transition between sender and
intended receiver without any addition to information being detected.
• Non-repudiation:
The creator/sender of information cannot deny his or her intention to send
information at later stage.
• Authentication:
The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.
• Confidentiality:

• Confidentiality is the assurance that information is only available


to authorized entities.
• Integrity
• Integrity is the assurance that information is modifiable only by authorized entities.
• Authentication
• Authentication provides assurance about the identity of an entity or the validity of a
message. There are two types of authentication:

• ENTITY DATA ORIGIN


• AUTHENTICATION AUTHENTICATION
ENTITY AUTHENTICATION
• Entity authentication is the assurance that an entity is currently involved and active in a
communication session.

• Traditionally, users are issued a username and password, which are used to gain access to
the platforms they are using- SINGLE FACTOR AUTHENTICATION (as there is only one
factor, namely something you know, that is, the password and username.)

• This type of authentication is not very secure due to various reasons, such as password
leakage; therefore, additional factors are now commonly used to provide better security.

• The use of additional techniques for user identification is known as multifactor


authentication or two-factor authentication if only two methods are used.
Various factors are described here:

1.The first factor is something you have, such as a hardware token or smart card. In
this case, a user can use a hardware token in addition to login credentials to gain access
to a system. This provides protection by requiring two factors of authentication. A user
who has access to the hardware token and knows the log-on credentials will be able to
access the system. Both factors should be available in order to gain access to the
system, thus making this method a two-factor authentication mechanism.
2.The second factor is something you are, which uses biometric features in order
to identify the user. In this method, a user uses fingerprint, retina, iris, or hand
geometry to provide an additional factor for authentication. This way, it can be ensured
that a user was indeed present during the authentication mechanism as biometric
features are unique to an individual. However, careful implementation is required in
order to ensure a high level of security as some research has suggested that biometric
systems can be circumvented in certain scenarios.
DATA ORIGIN
AUTHENTICATION

• Also known as message authentication, this is an assurance that the source of information
is verified.

• Data origin authentication implies data integrity because if a source is corroborated, then
data must not have been altered.

• Various methods, such as Message Authentication Codes (MACs) and digital signatures are
most commonly used.
Cryptographic primitives
• Cryptographic primitives are the basic building blocks of a security
protocol or system.
• cryptographic algorithms that are essential for the building of
secure protocols and systems.
• A security protocol is a set of steps taken in order to achieve
required security goals by utilizing appropriate security
mechanisms.
A generic cryptography model
• In the preceding diagram, P, E, C, and D represents Plain text, Encryption,
Cipher text, and Decryption, respectively. Entity: It is either a person or a
system that sends, receives, or performs operations on data.
• Sender: Sender is an entity that transmits the data.

• Receiver: Receiver is an entity that takes delivery of the data.

• Adversary: This is an entity that tries to bypass the security service .

• Key: A key is some data that is used to encrypt or decrypt data.

• Channel: Channel provides a medium of communication between entities.


Types Of Cryptography:
• Symmetric Key Cryptography:
It is an encryption system where the sender and receiver of message use a single common
key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but
the problem is that sender and receiver have to somehow exchange key in a secure
manner. The most popular symmetric key cryptography system is Data Encryption
System(DES).
• Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated
as per the plain text which makes it impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt passwords.
• Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information. A public key is
used for encryption and a private key is used for decryption. Public key and Private Key are
different. Even if the public key is known by everyone the intended receiver can only
decode it because he alone knows the private key.
Symmetric Key Cryptography:
Asymmetric Key Encryption (or Public Key Cryptography)
• The encryption process where different keys are used for encrypting and
decrypting the information. Keys are different but are mathematically related,
such that retrieving the plain text by decrypting cipher text is feasible.
Transposition Ciphers
• In Cryptography, a transposition cipher is a method of encryption
by which the positions held by units of plaintext (which are
commonly characters or groups of characters) are shifted according
to a regular system, so that the ciphertext constitutes a
permutation of the plaintext.
• That is, the order of the units is changed (the plaintext is
reordered). Mathematically, a bijective function is used on the
characters’ positions to encrypt and an inverse function to decrypt.
Substitution Cipher
• Method of encryption by which units of plaintext are replaced with
cipher text, according to a fixed system; the “units” may be single
letters (the most common), pairs of letters, triplets of letters, mixtures
of the above, and so forth.
Classical encryption techniques
• There are 2 types
Substitution: The plaintext is replaced by any other letter, number or
symbol without changing the position of plaintext. Ex: Caesar Cipher
Playfair Cipher, Hill Cipher
Example: IWILL becomes ABADD
1. Transposition: Letters are not changed, but their positions are
changed. Permutations are performed. Examples: Rail fence cipher
and Columnar transposition cipher.
Example: ABC becomes ABC, ACB, BAC, BCA, CAB, CBA.
Substitution types
1. Monoalphabetic substitution
2. Polyalphabetic substitution
3. Caesar Cipher
4. Playfair Cipher
5. Hill Cipher
6. One time Cipher.
Symmetric vs Asymmetric encryption
Symmetric Asymmetric
It only requires a single key for both encryption It requires two key one to encrypt and the other
and decryption. one to decrypt.
The size of cipher text is same or smaller than The size of cipher text is same or larger than the
the original plain text. original plain text.
The encryption process is very fast. Slow
It is used when a large amount of data is It is used to transfer small amount of data.
required to transfer.
It only provides confidentiality. It provides confidentiality, authenticity and non-
repudiation.
Examples: 3DES, AES, DES and RC4 Examples: Diffie-Hellman, ECC, El Gamal, DSA
and RSA
In symmetric key encryption, resource utilization In asymmetric key encryption, resource
is low as compared to asymmetric key utilization is high.
encryption.
This message is clear. Convert to cipher
Monoalphabetic example
Polyalphabetic (k+p-26)
Caesar Cipher. Replacing each letter with 3 places further down

You might also like