Seminar Presented by Pankaj sharma
(kuk. University)
Cryptography
Cryptography is Nothing New
Cryptography is the art of "secret writing".
Cryptography was used in ancient times. Cryptography was used in both sides of the revolutionary war. Cryptography has been featured in may mystery stories, including Sherlock Holmes.
Cryptography
What is Cryptography
Cryptography is a process of communications. Cryptography takes something readable and makes it unreadable. Cryptography is reversible in a controlled manner.
Cryptography does NOT destroy information.
Cryptography
Cryptography is More Important Now Than Ever
Computers and networks are getting faster and faster.
Connectivity and access are improving and increasing. Companies now exist which require the net for their very survival.
Individuals are relying on the net for more and more personal, professional, and commercial activities.
There is real value on the net in content, communications, and commerce.
Cryptography
Threats in the Digital World
Criminals will attack systems for financial gain. Criminals will use systems for financial gain. Privacy violations by marketeers, criminals, and government agencies. Identity theft threatens your reputation and your ability to prove who you say you are.
Cryptography
The Adversaries
Crackers Insiders The Press Lone Criminals Organized Crime
Industrial Espionage Agents
International Espionage Agents
Terrorists
National Intelligence Government Agencies
Cryptography
Cryptography to protect our networks Cryptography to protect our commerce Cryptography to protect our communications Cryptography to protect our files
Cryptography to protect our filesystems Cryptography to protect our identify
Cryptography
Cryptography Can Do Some Really Cool Stuff
It can protect your privacy It can protect your
communications It can protect your property It can protect your systems It can authenticate It can authorize
It can validate It stops a lot of lying and cheating
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Secret Key Cryptography: Uses a single key for both
encryption and decryption
Public Key Cryptography: Uses one key for encryption
and another for decryption
Hash Functions: Uses a mathematical transformation to
irreversibly "encrypt" information
WHAT IS SECRET KEY CRYPTOGRAPHY ?
Secret Key Cryptography - Types
stream ciphers :Stream ciphers operate on
a single bit (byte or computer word) at a time, and implement some form of feedback mechanism so that the key is constantly changing. block ciphers :the scheme encrypts one block of data at a time using the same key on each block.
stream ciphers
Stream ciphers come in several flavors but two are worth mentioning here :
Self-synchronizing stream ciphers calculate each
bit in the keystream as a function of the previous n bits in the keystream
Synchronous stream ciphers generate the
keystream in a fashion independent of the message stream but by using the same keystream generation function at sender and receiver.
Block ciphers
Block ciphers can operate in one of several modes; the following four are the most important:
Electronic Codebook (ECB) mode : Cipher Block Chaining (CBC) mode : Cipher Feedback (CFB) mode : Output Feedback (OFB) mode
Cryptography
Symmetric Key Cryptographic Algorithms
DES
TripleDes Blowfish
IDEA
Cast RC4 RC5 TwoFish
WHAT IS PUBLIC KEY CRYPTOGRAPHY ?
Cryptography
Public Key Cryptographic Algorithms
RSA Diffie-Hellman Elliptic curve
Hash Functions
some sense, use no key . Among the most common hash functions in use today in commercial cryptographic applications are: MD2 (RFC 1319) MD4 (RFC 1320) MD5 (RFC 1321) The Secure Hash Algorithm (SHA) ,in particular, the SHA-1
Hash functions, also called message digests and one-way encryption, are algorithms that, in
Why Three Encryption Techniques?
Hash functions : for data integrity
Secret-key cryptography: ideally suited
to encrypting messages
public-key cryptography : for Key exchange
hybrid cryptography
digital envelope digital signature
Cryptography
Future Directions
Crypto Smart Cards Crypto Ring Processors
Java Rings Distributed crypto crackers S/MIME Cracking Screen Savers
"Chinese Television" crypto crackers Low cost Beowolf supercomputers
Cryptography
Summary
There are a large number of tools for cryptography available on Linux. Most are not well integrated into the operating systems and applications. Most require some effort and some knowlege to use. They are, however, just tools. How they are used or abused is up to the end user.
A Parting Thought
"If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography."
******* THE END ********