CRYPTOGRAPHY


Cryptography – Science of Secret Writing

Algorithm – Mathematical functions / equations (which is Not Secret)
Key – How to carry out the mathematical function (which is Secret)

Algorithm:
a b c d e f g h I j k l m n o p q r s t u v w x y z

Key=2

Plain Text = RAJA → Cipher Text = TCLC

Symmetric Key:- {The Key for the Encryption in source is same as the Key for Decryption in destination}

Crypto System:- Implementation of cryptography which transforms a message from plain text to cipher text.

Cryptanalysis:- It is the practice of obtaining plain text from cipher text. (Breaching the Encryption)


Ceaser Cipher:-

Symmetric Cipher – Sender/Receiver uses the same Key
Key = 3 (spaces in the alphabet)

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C


Plain Text = RAJ → Cipher Text = UDM


Substitution Cipher:- It is a substitute which replaces text with another in reverse.

ABCDEFGHIJKLMNOPQRSTUVWXYZ
ZYXWVUTSRQPONMLKJIGHFEDCBA

Plain Text = RAJ → Cipher Text = JZR


Polyalphabetic Cipher:- It points each row corresponds to a Ceaser cipher.
Vigenere Table: {Import image}

Secret Key = “SECRET”

it is written like, SECRET SECRET SECRET SECRET
plain text, MYBANK PASSWO RDISMO HAN123
Cipher text, Encrypted cipher ---------→


Transposition Cipher:- It means changes / transpose.

Plain text - Corporate Company Services
Grouped Message - corporatecompanyservi
Order key is - 123451234512345123451
Key is - 245133152454123154324

Cipher text is - opocrtrcaeanompyivre



Cryto System:- There are two types of crypto system,
* Symmetric (which is similar)
* Asymmetric (which is different/not similar)

[Traditional form of cryptography known as single key/secret key/symmetric key cryptography]
[It uses Substitution of Transposition techniques]

Process of Encryption:
Plain text + Encryption = Cipher text
Cipher text + Decryption = Plain text

Process of Transforms:
P.T + Key = E.M || E.M + Key = P.T

[Key which is used to encrypt a msg and the key which is used to decrypt a msg are “ONE” and the “SAME”]

Difficult:-
- Key Maintenance
- Key distribution (Key has to be transmitted over secure channel)

Symmetric Algorithm:
The encryption algorithm can be applied on plain text messages in two methods,
* Block cipher
* Stream cipher

Block cipher:- It is used to make blocks to achieve cipher text.
Message/Plain text = My name is Mohanraj
Block cipher = MYNA MEIS MOHA NRAJ
B1 B2 B3 B4

Cipher messages = C1 C2 C3 C4

If block 1 and block 3 are identical, will get identical cipher. Attacker will get the pattern and deduce the original messages.

Stream Cipher:- It operates on bits and generates a key stream.

Key stream = 10011001101
Plain stream = 00110110001
XOR Result = 10101111100

Key stream {XOR} plain stream = Cipher text



DES (Data Encryption Standards):- It uses 16 rounds of Mathematical procedures.

In 1974, combined with NIST(national institute of standards and technology) and NSA (national security agency) invented a standard called DES.

Using DES, IBM has introduced an algorithm called “Lucifer”. Basically Lucifer is a 128 bit but NSA has altered and reduced to 64. From 64 bits, 8 bits goes for parity and hence it has only 56 bits.

After all the changes, the name has “DEA” - Data Encryption Algorithm.

DES Modes:-
a) – Cipher Feedback (CFB) – } Stream cipher, which are used in Hardware
b) – Output Feedback (OFB) – } Stream cipher, which are used in Hardware
c) – Electronic Code book (ECB) – } Block cipher, which are used in Software
d) – Cipher block chaining (CBC) – } Block cipher, which are used in Software

3DES – Triple DES Modes: It can do 3 rounds of encryption either with 2 or 3 keys.

1) DES – EEE3
2) DES – EDE3
3) DES – EEE2
4) DES – EDE2


AES – Advanced Encryption Standard:-

AES = ‘X’ bits

X are, 128, 192, 256
AES128, AES192 and AES256.

CBC – Cipher Block Chain

{import image which tells everything}

Asymmetric Cryptography:- It is also known as pubic key cryptography, which is introduced in 1976 by Whitefield Diffie & Martin Hellman.

{upload image which should explain everything}

Algorithm:
a) Diffie Hellman Algorithm
b) RSA
c) Elgammal


Advantages of Asymmetric:
– No key distribution / Public key hosted in public
– Scalability
– Range of security services

Features:
– Privacy / Confidentiality || Encryption
– Authentication || Digital Signature / CA
– Data-Integrity || Hashing / MD
– Non-repudiation || Digital Signature

PKI – Public key infrastructure:- It provides full range of security services,

Pki is a combined with below,
- Public key
- Private key
- Digital signature
- Digital certificate
- Hashing
- Message Digest



No comments: