10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Cryptography The science of writing in secret code.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Web Security Basharat Mahmood, Department of Computer Science,CIIT,Islamabad, Pakistan. 1.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Crypto Bro Rigby. History
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Cryptography, Authentication and Digital Signatures
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Security Protecting information data confidentiality
Basics of Cryptography
CIT 380: Securing Computer Systems
Chapter Five Prepared by: Raval, Fichadia
ISA 400 Management of Information Security
Symmetric Cryptography
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Cryptography Why Cryptography Symmetric Encryption
Identity Theft uses of Cryptography
ISA 330 Introduction to Proactive System Security
What is network security?
Cryptography and Security Technologies
Cryptography.
Encryption
Cryptography.
CSCI-235 Micro-Computer Applications
Cryptography Basics and Symmetric Cryptography
Chapter 3:Cryptography (16M)
Security.
Cryptography and Network Security
The Secure Sockets Layer (SSL) Protocol
DISSERTATION ON CRYPTOGRAPHY.
Basic Network Encryption
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Operating Systems Concepts
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Presentation transcript:

10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security

Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.

 Messages: 1.Plaintext 2.Ciphertext  Ingredients: 1.Algorithm(s) 2.Key(s)  Players: 1.Cryptographer: invents clever algorithms 2.Cryptanalyst: breaks clever algorithms

1. Symmetric-key Cryptography: Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the receiver applies the same key to decrypt the message and recover the plain text. 2. Public-Key Cryptography: This is the most revolutionary concept,In Public-Key Cryptography two related keys (public and private key) are used. Public key may be freely distributed, while its paired private key, remains a secret. The public key is used for encryption and for decryption private key is used. 3. Hash Functions: No key is used in this algorithm. A fixed-length hash value is computed as per the plain text that makes it impossible for the contents of the plain text to be recovered. Hash functions are also used by many operating systems to encrypt passwords.

Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures, but one problem has to be solved to enable these algorithms: binding cryptographic keys to machine or user identities. Public key infrastructure (PKI) systems are built to bridge useful identities ( addresses, Domain Name System addresses, etc.)

Caesar Cipher in Cryptography Caesar Cipher is one of the simplest technique, It’s simply a type of substitution cipher that each letter of a given text is replaced by a letter some fixed number of positions down the alphabet, For example with a shift of 1, A would be replaced by B, B would become C, and so on.. Mathematical formula

To pass an encrypted message from one person to another, it is first necessary that both parties have the 'key' for the cipher, so that the sender may encrypt it and the receiver may decrypt it. For the caesar cipher, the key is the number of characters to shift the cipher alphabet Here the sender encrypt a particular massage with (Key=5) Plain text = suryadatta so each alphabet shifted 5 times Key = 5 Ciphertext = xzwdfifyyf The receiver must use of (Key=5) to decrypt the massage from sender.

 Nowadays we have 5 Common Encryption Algorithms the Unbreakable of the Future 1. Triple DES 2. RSA 3. Blowfish 4. Twofish 5. AES

Cryptography is the practice, study of technique, to secure communication and writing in secret code to encrypt and decrypt data so that no other person except the intended recipient could read The Main Goals of cryptography: * Data confidentiality * Data Authenticity * Data integrity