Chapter 3:Cryptography (16M)

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Encryption Methods By: Michael A. Scott
Chapter 2 – Classical Encryption Techniques
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
1 Chapter 2 Plain Text Also called as clear text Language that we normally use Easily understood by everybody.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Cryptography Lynn Ackler Southern Oregon University.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Computer Security (CS4800)
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography – Test Review
(Principles of Informatioan security)
Chapter 2 Basic Encryption and Decryption
Crypto in information security
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Identity Theft uses of Cryptography
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Columnar Transposition
TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another
Introduction Of System Security
Chapter-2 Classical Encryption Techniques.
Encryption
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
Networks Encryption.
M3: Encryption r By Andrew Stringer.
Visit for more Learning Resources
PART VII Security.
NET 311D Information Security
Cryptography and Network Security
Simple Encryption- Lesson 5
Digital Communications
Unit 2: Cryptography & Cryptographic Algorithm
DES (Data Encryption Standard)
Double Transpositions
Computer Security Chapter Two
Types of Cryptanalysis attacks
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Chapter 3:Cryptography (16M) Visit for more Learning Resources

CRYPTOGRAPHY Cryptography is the science and art of transforming messages to make them secure and immune to attack.

Cryptography It is an art of writing in secret message. It is important when communicating over untrusted medium. It protects data from alteration Three schems of cruptography are: Secret key cryptography Public key cryptography Hash Functions

Cryptanalysis The process of trying to break cipher text message to obtain the original message itself is known as cryptanalysis.

Cryptology It is combination of cryptography and cryptanalysis.

Encryption and Decryption The process of encoding plain text into cipher text message is known as Encryption.

Decryption: The reverse process of transforming cipher text message back to plain text message is called decryption.

Encryption and Decryption process In the communication, the computer at sender‘s end usually transforms a plain text into cipher text by performing encryption by applying encryption algorithm. The encrypted cipher text is then sent to the receiver over the network. The receiver‘s computer then takes the encrypted message and then perform the reverse of encryption i.e. decryption by applying decryption algorithm.

Encryption and Decryption process

SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.

Substitution cipher techniques Caesar's Cipher Mono-Alphabetic Cipher A Homophonic Substitution Cipher A Polygram Substitution Cipher A Polyalphabetic Substitution Cipher e.g.Vigenere Cipher One time Pad(Vernam Cipher)

TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plain text is changed with one another. 1 2 3 4 5 6 M E T A F R P Y 4 2 1 6 3 5 T E M F A P R Y

Transposition cipher techniques Rail Fence Cipher Coulmnar Transposition Simple Coulmnar Transposition Double Coulmnar Transposition For more detail contact us