15
ON ON Cryptography

Cryptography

Embed Size (px)

DESCRIPTION

Cryptography

Citation preview

Page 1: Cryptography

ON

ON

Cryptography

Page 2: Cryptography

WHY DO WE NEED TO SECURE NETWORK ???

Page 3: Cryptography
Page 4: Cryptography

Information needs to be hidden from unauthorized access (confidentiality)

protected from unauthorized change (integrity)

available to an authorized entity when it is needed (availability).

Page 5: Cryptography

Symmetry key Encryption

What observation is done here????????(w.r.t locking)

Page 6: Cryptography

TRADITIONAL CIPHERS

-> Confidentiality is achieved using ciphers

-> Traditional ciphers are called symmetric-key ciphers (or secret-key ciphers) because the same key is used for encryption and decryption

Page 7: Cryptography

General Idea of Traditional ciphers

Page 8: Cryptography

Traditional Ciphers

Substitution ciphers Transposition ciphers

A substitution

cipher replaces one symbol with

another.

A transposition

cipher reorders symbols.

Page 9: Cryptography

e

h

tt

m

t

ao

y

z

cn

e

i

ak

n

g

ts

E

H

T

T

M

T

A

O

Y

Z

C

N

E

I

A

K

N

G

T

S

E HT T M TAO Y ZCNE IAK N GT S

Write row by row

e ht tm ta oy zc ne ia kn gt s

Plaintext

Ciphertext

Read column by column

e

h

tt

m

t

ao

y

z

cn

e

i

ak

n

g

ts

E

H

T

T

M

T

A

O

Y

Z

C

N

E

I

A

K

N

G

T

S

E HT T M TAO Y ZCNE IAK N GT S

Read row by row

Ciphertext

Write column by column

Plaintext

e ht tm ta oy zc ne ia kn gt s

Transmission

Page 10: Cryptography
Page 11: Cryptography
Page 12: Cryptography

Till now we were aware of only “Text” form of the data

What if we want to send audio/ video??????

Page 13: Cryptography

Modern CiphersTraditional ciphers• only text

Modern ciphers• numbers• graphics• audio, and video data

Character oriented ciphers

Bit oriented ciphers

Page 14: Cryptography

How actually modern ciphers works?Data will be converted to stream of bit

And send the encrypted stream

Encrypt the stream

Page 15: Cryptography

Modern block ciphers