THE EMERGING ROLE FOR SECRET COMMUNICATION
What is cryptography?
cryptography means study of network security . Cryptography in the
greek means “secret writing” .
Introducing of cryptography:
First recorded use of cryptography for correspondence was by the
spartans who employed a cipher device called scytale to send any information in
secret
In networking
• The system deals with security during transmission of information .
• This transfer of information could be done through network .
• Commonly used technology is cryptography .
Why cryptography?
• People are afraid of entering their credit card number on a secure web site, but during
their vacation they had their card to an unknown barkeeper.
• People are afraid that internet power lines could be easily tapped. They should be
aware to that it can be tapped already today and that encryption is the only way to go.
What cryptography can do?
• Potentially, cryptography can hide information while it is in transit of storage. In
general cryptography can
Provide secrecy .
Authenticate that a message has not changed in transit.
Implicitly authenticate the sender.
How cryptography works
• The given data will be encrypted in bit-level decomposition.
B-bit image secret sharing
K 1 ×K 2
gray-s c ale image
Bit-lev el
dec ompos ition
enc ryption
enc ryption
2K 1 ×2K 2
gray-level
Dec ryption S hare S 1
Ou tput image
K 1xK 2
B-bit imag e 2K 1 ×2K 2
gray-level
2008/7 /25
S hare S 2
Encryption and decryption
• Encryption means changing plain text to cipher text .
• Decryption means changing cipher text to plain text .
General example in day to day life
Sending information:
• Here Alice is sender , Charlie is network and Bob is receiver .
• Here Alice wants to send the information for Bob through Charlie .
Encryption using alphabetically transposition and
decomposition
Julius Caesar: replaces each letter by another
one in the same order (shift)
For instance, (shift by 3) replace:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
By
DEFGHIJKLMNOPQRSTUVWXYZABC
Example:
CRYPTOGRAPHY
Becomes FUBSWRJUDSKB
Secret code for bank card
ATM: Automatic teller machine
• For getting the security Encryption and
decryption takes place from user to main
memory
• Here encryptions and Decryptions acts as lockers for data
Properties of hiding schemes
Robustness
Indefectibility
Invisibility
Security
Future of cryptography
• Cryptography 2000 • Cryptography 2010
• Electronic road toll • Brave new pervasive worlds
• prevents cheating by drivers • Bridge sensors
• Protects privacy of drivers • Cleaning robots
• Car with internet access
• Smart street lamps
Future challenges
• Side channel attacks against embedded micro p
• new application domain for the security & crypto
• IT security in cars
conclusion
• Cryptography is necessary where ever the network is
being used . Network security cannot be obtained
without cryptography
Querries?
Thank you