Introduction to Cryptology Fall 2006. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Cryptography The science of writing in secret code.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 2 – Classical Encryption Techniques
SYMPATRIC ENCRYPTION L.Tahani Al jehani. Introduction  Definition  Cryptography, a word with Greek origins, means “secret writing”.  It refers to the.
Cryptography Week-6.
Cryptography CSPrinciples II February 12, Needs for Privacy What are some specific needs for privacy when using the internet?
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
1st Class Discrete Structures الهياكل المتقطعة أستاذة المادة: م. م
Cryptography Lecture 1: Introduction Piotr Faliszewski.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
a connection between language and mathematics
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (1) Information Security.
Cryptology By Greg Buss Pat Shields Barry Burke. What is Cryptology? Cryptology is the study of “secret writing.” Modern cryptology combines the studies.
Image Representation Privacy/Cryptography CS 104 October 3, 2011.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
ITMS – 3153 Information Systems Security
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
National Institute of Science & Technology Cryptology and Its Applications Akshat Mathur [1] Cryptology and Its Applications Presented By AKSHAT MATHUR.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Traditional Symmetric-Key Ciphers
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Introduction (Pendahuluan)  Information Security  Criptography.
COMPUTER AND NETWORK SECURITY First of all, an introduction to the field of computer security and some of relevant issues are presented. Then, a background.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Cryptography – Test Review
CIT 380: Securing Computer Systems
Cryptography.
CSCI-235 Micro-Computer Applications
Cryptography and Cryptanalysis
Unit 2: Cryptography & Cryptographic Algorithm
Basic of Modern Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Introduction to Cryptology Fall 2006

Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove integrity [1] Cryptography comes from the Greek words Kryptos, meaning hidden, Graphen, meaning to write. Cryptography is the art of communicating confidentially through an insecure channel Cryptanalysis is the art of deciphering those communications when one is not the legitimate receiver. Cryptology is the union of these two domains. Cryptology is actually the study of codes and ciphers.

Definitions Plaintext the original message that is to be changed into a secret form Cipher, Cryptosystem, Encryption Method is a procedure for converting the plaintext message into encrypted message – ciphertext The word cipher originates from the Hebrew word "Saphar," meaning "to number." Decryption - the process that conducted by the intended receiver to recover original message (plaintext) from the encrypted message (ciphertext) Key - keeps the message secret

Encryption-Decryption PlaintextCiphertext Encryption Method Encryption key CiphertextPlaintext Decryption method Decryption Key

Symmetric and Asymmetric Ciphers Symmetric Cipher – knowledge of encryption key is equivalent to knowledge of the decryption key, or the same key is used for encryption and decryption. Asymmetric Cipher (Public-Key Cryptosystem) the knowledge of encryption key give little information about the decryption key and vice versa

Early History of Cryptology Polybius’ Checkboard 205 – 123 B.C. Plaintext POLYBIUS produces the ciphertext ABCDE 2FGHIJK 3LMNOP 4QRSTU 5VWXYZ

Julius Caesar Cipher Caesar enciphered messages by replacing each letter by the third letter after that one: A  D, B  E, C  F, D  G, …Z  C Plaintext “ET TU, BRUTE?'' becomes the ciphertext “HW WX, EUXWH?'' Ciphertext may be deciphered by replacing each letter by the third previous letter. We think of each letter as corresponding to a number from 0 to 25 To encipher, we map numbers according to C  ( P + 3 )(mod 26) To decipher, we map numbers according to P  (C – 3) (mod 26)