Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
26 views88 pages

Cryptography

The document provides an overview of cryptography, detailing its concepts, types, and applications, including symmetric and asymmetric encryption. It explains the importance of confidentiality, data integrity, and authentication in securing information, along with various cryptographic algorithms like DES, 3DES, and AES. Additionally, it discusses cryptanalysis and the challenges associated with both symmetric and asymmetric encryption methods.

Uploaded by

ND D
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views88 pages

Cryptography

The document provides an overview of cryptography, detailing its concepts, types, and applications, including symmetric and asymmetric encryption. It explains the importance of confidentiality, data integrity, and authentication in securing information, along with various cryptographic algorithms like DES, 3DES, and AES. Additionally, it discusses cryptanalysis and the challenges associated with both symmetric and asymmetric encryption methods.

Uploaded by

ND D
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 88

CRYPTOGRAPHY

SYMMETRIC ENCRYPTION

ASYMMETRIC ENCRYPTION
Presented by group 7
Group
members
include:

Trần Thị Thùy Ngân Quách Thùy Linh Nguyễn Duy


Dũng
Storm Wind Thunde
y r
TABLE
OF
CONTE
0
1
NTS
Cryptograph
y
0 Symmetric
2
encryption
0 Asymmetric encryption
3
What is
Cryptograph
y?
TOPIC:
1. Introduction
1

1. Basic Concepts
2
1. Types of Cryptographic
3 Algorithms

1.4 Cryptanalysis

1.5 Objectives and Applications


1.1. INTRODUCTION:

a, Concept Of
Cryptography:
−Cryptography is the study of mathematical
techniques related to information security.
−Main aspects:
• Confidentiality
• Data integrity
• Entity authentication
• Data origin
authentication
1.1 INTRODUCTION:
. b, History of Development
−Origin of the word “Cryptography”:
• “Cryptography” is derived from the Greek:

−A primitive form of cryptography:


• Historians believe that Egyptian hieroglyphics (around 1900
B.C.E), to be an early instance of encipherment.

• The Rosetta Stone (discovered in 1799 in Egypt) was the key to


deciphering hieroglyphics.
• 1822, successfully deciphered them.
1. Basic Concepts
2

• Plaintext (or Plain Data): Unprocessed,


readable information

• Ciphertext: the result of encryption, where


the information is transformed into a
unreadable format.
1. Basic Concepts
2

• Encryption: converting information from a


readable format into an unreadable
fromat.
• Decryption: the process of reversing
encryption, converting ciphertext back into
its original readable form.
1. Basic Concepts
2

• Key (Cryptography key) is a piece of


information in the form of a sequence of
number or letter, used in the encryption
and decryption and decryption process. It
may be secret (as in symmetric
cryptography) or public (as in asymmetric
cryptography).
1. Types of Cryptographic Algorithms
3

• Symmetric Encryption (private key


encryption) is an encryption
methodology that uses the same
secret key for both encryption and
decryption of a message.
1. Types of Cryptographic Algorithms
3

• Hash functions are mathematical


algorithms that generate a message
summary or digest (sometimes called a
fingerprint) to confirm the identity of a
specific message and to confirm that
there have not been any changes to the
content.
·They do not create a ciphertext
·Confirm message identity and integrity.
1,4 Cryptanalysis
a. Concept:
• The study and analysis of existing ciphers or
encryption algorithms.
• Purpose: To evaluate their quality, find weaknesses, or
reverse the encryption process without the key.
• Based on: Ciphertext.

b, Types of Attacks in
Cryptanalysis:
• Ciphertext-only attack
• Known-plaintext
attack
1,4 Cryptanalysis
b, Types of Attacks in
Cryptanalysis:
• Ciphertext-only attack
− The cryptanalyst or attacker has access
only to the ciphertext.
− There is no information about the
plaintext or the key.
− Objective: To find the key or the plaintext
by analyzing the ciphertext.
1,4 Cryptanalysis
b, Types of Attacks in
Cryptanalysis:
• Known-plaintext attack

− The attacker possesses both the ciphertext and


its corresponding plaintext (or an assumption of
the plaintext).
− Objective: To determine the encryption key to
decrypt other data.
1,4 Cryptanalysis
b, Types of Attacks in
Cryptanalysis:
• Brute-force
attack
− Trying all possible keys to find the
correct one.
− Objective: Decrypting data.
− A common method when no
vulnerabilities exist in the
encryption algorithm.
1.5 Goals & application:
a, Goald of
Cryptography:
• Confidentiality: Ensures only authorized parties can access
information
• Data Integrity: Ensures data is not altered by unauthorized parties
and detects manipulation like insertion, deletion, or substitution.
• Authentication: Ensures identification of entities and information.
• Non-repudiation: Ensures that an entity cannot deny past actions
or commitments.
1.5 Goals & application:
b, Application of
Cryptography:
• Securing Communication: data encryption,
security protocols
• Protecting Stored Data: disk encryption,
database security
• Authentication and Digital Signatures: user
authentication, digital signatures
• Cryptocurrencies and Blockchain: secure
transactions, digital wallets.
SYMMETRIC
ENCRYPTION
TOPIC:

1. Introduction
1

1. DES
2

1. AES
3
1. INTRODUCTION:
1
Encryption methodologies
that require the same secret
key to encipher and decipher
the message are using what
is called private key
encryption or symmetric
encryption. The primary challenge of
symmetric key encryption
is getting the key to the
receiver, a process that
must be conducted out of
band to avoid
interception.
1. DES and
2 3DES DES

• Key length: 128 bits


Developed by IBM and
• As implemented, DES
is based on the
uses a 64-bit block size
company’s Lucifer
and a 56-bit key
algorithm

In 1998, a group called the


Electronic Frontier
DES was adopted by NIST Foundation, using a
in 1976 specially designed
computer, broke a DES key
in less than three days
1. DES and
2 3DES
It was created to
provide a level of
security far beyond that
of DES

3DES did deliver on its


promise of encryption
3DES strength beyond DES, it too
soon proved too weak to
survive indefinitely

Within just a few


years, 3DES
needed to be
replaced
1. AE
3
S
AES is a federal information
processing standard (FIPS)
that specifies a
cryptographic algorithm used
within the U.S. government,
except for defense
infrastructure agencies.
The requirements for AES
stipulate that the algorithm
should be unclassified,
publicly disclosed, and
available royalty-free
worldwide
1. AE
3
S

AES was approved by


the Secretary of
Commerce as the official
federal governmental
standard on May 26,
AES implements a block
2002.
cipher called the Rijndael
Block Cipher with a
variable block length and
a key length of 128, 192,
or 256 bits.
Asymmetric
encryption
TOPIC
3. Introduction to asymmetric encryption
1

3.
2 How asymmetric encryption works

3. Asymmetric Encryption
Algorithms
3

3.
4 Limitations of asymmetric
encryption
3.1 . INTRODUCTION TO
ASYMMETRIC ENCRYPTION
3.1.INTRODUCTION TO ASYMMETRIC ENCRYPTION

Asymmetric encryption uses two diff erent but related keys


to encrypt and decrypt messages. If one key is used to
encrypt, only the other key can decrypt. This method helps
solve security and identity verifi cation problems.
3.2 . HOW ASYMMETRIC ENCRYPTION
WORKS
3.2. HOW ASYMMETRIC ENCRYPTION WORKS

Asymmetric encryption is most valuable when one key is


used as a private key, which is kept secret and known only
to the owner, and the other key is a public key, which is
stored in a public place for everyone to use. Therefore,
asymmetric encryption is also called public key encryption.
3.2. HOW ASYMMETRIC ENCRYPTION WORKS

Example of asymmetric encryption


3.3. ASYMMETRIC ENCRYPTION
ALGORITHMS
3.3.1. CONCEPT OF
ONE-WAY FUNCTIONS
AND TRAPDOOR
FUNCTION
3.3 .1. CONCEPT OF ONE-WAY FUNCTIONS AND TRAPDOOR FUNCTION

Asymmetric algorithms are based on one-way functions, which are


easy to compute in one direction but very diffi cult to compute in
the other direction.

Public key cryptography uses hash values, which are computed


from a number of inputs using a hashing algorithm.

The hash value is a summary of the original data


3.3 .1. CONCEPT OF ONE-WAY FUNCTIONS AND TRAPDOOR FUNCTION

Multiplying two small numbers is easy, but factoring a large


number into its original factors is very diffi cult. When the
multipliers are prime numbers of hundreds of digits, this
factorization becomes extremely complex, illustrating the one-way
nature of asymmetric encryption.
3.3 .1. CONCEPT OF ONE-WAY FUNCTIONS AND TRAPDOOR FUNCTION

However, mathematics has a shortcut called a "trap door" that


makes it easy to perform the inverse of a one-way function.

Thanks to this mechanism, a key can be used to encrypt or


decrypt, but not both, so keys are needed: the public key is used
primarily, and the private key is generated from the declared key.
3.3.2.THE RSA
ALGORITHM
3.3.2.The RSA algorithm.

RSA is one of the most popular public key cryptosystems


Released in 1977, RSA was the fi rst public key
cryptosystem to be used commercially.
RSA has been integrated into Microsoft and Netscape
browsers and has become the de facto standard for public
key cryptographic applications.
3.4. LIMITATIONS OF
ASYMMETRIC ENCRYPTION
3.4. LIMITATIONS OF ASYMMETRIC ENCRYPTION

The problem with asymmetric encryption is that each


exchange between two parties requires four keys.

When multiple organizations are involved, each party


must manage multiple public keys
3.4. LIMITATIONS OF ASYMMETRIC ENCRYPTION

In addition, asymmetric encryption


consumes more CPU resources than
symmetric encryption. Therefore, hybrid
systems such as public key infrastructure
(PKI) are often preferred over purely
asymmetric encryption systems.
Differences from symmetric encryption.
MINI GAME 1: flip
the puzzle pieces
Game: flip the puzzle pieces
ROUND 1

 Select a puzzle piece


and then answer the
question. If the
answer is correct the
1 2 3
puzzle piece will be
revealed.
 After the picture is
revealed you will
guess what the
picture is about.
4 5 6
Let's play
Game: flip the puzzle pieces

1 2 3 4 5 6

1 2 3

THEME IMAGE
4 5 6
1 2 3 4 5 6
Game: flip the puzzle pieces

What is cryptography? What


is it used for?

1
Cryptography is the study of
mathematical techniques related to
aspects of information security
such as confidentiality, data
integrity, entity authentication, and
data origin authentication to
encrypt or decrypt information
return
Game: flip the puzzle pieces

2
How many goals does
cryptography have? What are
they?

There are 4 goals . They are


Confidentiality, Data integrity,
Authentication and Non-repudiation

return
Game: flip the puzzle pieces

What is cryptanalysis?

3
Cryptanalysis is the study and
analysis of existing ciphers or
encryption algorithms in order to
assess their quality, to find
weaknesses, or to find a way to
reverse the encryption process
without having the key

return
Game: flip the puzzle pieces

4
What symmetric
encryption
cryptosystems are the
most widely used?
The Data Encryption
Standard (DES)

return
Game: flip the puzzle pieces

5
What is asymmetric
encryption?
Asymmetric encryption uses
two different but related keys,
and either key can be used to
encrypt or decrypt the
message.

return
Game: flip the puzzle pieces

What is the primary

6
challenge of symmetric
key encryption?
The primary challenge of
symmetric key encryption is
getting the key to the receiver, a
process that must be conducted
out of band (meaning through a
channel or band other than the
one carrying the ciphertext) to
avoid interception.
return
ROUND 2

Let’s play
0 0 0
1 2 3
0 0 0
4 5 6
0 0 0
7 8 9
ĐÁP ÁN Symmetric Encryption
QUESTION
0
1
………….is a service which relates to verification
and it applies for both entities and information itself.

A. Authentication B. Data integrity

C. Non-repudiation D. Confidentiality
CORRECT ANSWER
OH NO! THE ANSWER
IS NOT CORRECT
QUESTION
0
8
What is the main difference between
symmetric and asymmetric encryption?

A. Asymmetric encryption is B. Symmetric encryption uses one key,


always faster than symmetric while asymmetric encryption uses two
encryption keys

C. Symmetric encryption is more


D. Asymmetric encryption does not
secure than asymmetric
use keys
encryption
QUESTION:
0
3
Which of the following is NOT a goal of
cryptography?

A. Confidentiality B. Increasing internet speed

C. Data integrity D. Authentication


QUESTION
0
What symmetric encryption cryptosystems is
4
one of the most popular public key
cryptosystems?

A. DES B. AES

C. RSA D. 3DES
QUESTION
0
5
When was Data Encryption Standard found
unsafe?

A. 1977 B. 1978

C. 1975 D. 1976
QUESTION:
0
6
When was a DES key broken and who broke it?

A. In 1998. By a group called the B. In 1997. By a group called the


Electronic Frontier Foundation Electronic Frontier Foundation

C. In 1997. By a group called D. In 1998. By a group called


the International Business the International Business
Machines Machines
QUESTION
0
Which of the followings is the study of
7
analyzing information systems in order to
study the hidden aspects of the systems?

A. Cryptography B. Cryptanalysis

C. Cryptology D. A&B are correct


QUESTION
0
9
How many keys does asymmetric encryption
use?

A. 1 B. 3

C. 2 D. 4
QUESTION
0
2
What is the difference between DES and AES?

A. DES uses a key length of 128 bits, uses a 64- B. DES uses a key length of 128 bits, uses a 56-
bit block size and a 64-bit key while AES bit block size and a 56-bit key while AES
implements a block cipher called the Rijndael implements a block cipher called the Rijndael
Block Cipher with a variable block length and a Block Cipher with a variable block length and a
key length of 128, 192, or 256 bits. key length of 128, 192, or 256 bits.

C. AES uses a key length of 128 bits, uses a 64- D. DES uses a key length of 128 bits, uses a 64-
bit block size and a 56-bit key while DES bit block size and a 56-bit key while AES
implements a block cipher called the Rijndael implements a block cipher called the Rijndael
Block Cipher with a variable block length and a Block Cipher with a variable block length and a
key length of 128, 192, or 256 bits. key length of 128, 192, or 256 bits.
MINI GAME 2:
WORD PUZZLE
USE THE LETTERS
TO SPELL THE
WORD.
R I H X C E T P E T
THE ANSWER
IS...
C I H P E R T E X T
USE THE LETTERS
TO SPELL THE
R C H O RWORD.
A T P I C P G Y

A L O R I T H G M
THE ANSWER
IS...
C R Y P T O G R A P H I C

A L G O R I T H M
USE THE LETTERS
TO SPELL THE
U S X T I WORD.
V E E H A Y K E
THE ANSWER
IS...
E X H A U S T I V E

K E Y
USE THE LETTERS
TO SPELL THE
S I S C R WORD.
Y A N A Y L T P
THE ANSWER
IS...
C R Y P T A N A L Y S I S
USE THE LETTERS
TO SPELL THE
WORD.
S S I C T C R Y P T U G L O I I N
THE ANSWER
IS...
C R Y P T O L I N G U I S T I C S
USE THE LETTERS
TO SPELL THE
C O R E SWORD.
R N G D N P O I

T X E N T I P A L L B O K C
THE ANSWER
IS...
C O R R E S P O N D I N G

P L A I N T E X T B L O C K
USE THE LETTERS
TO SPELL THE
J D E A N WORD.
L I R K B O L C

R X C H P I
THE ANSWER
IS...
R I J N D A E L B L O C K

C I P H E R
USE THE LETTERS
TO SPELL THE
M M Y WORD.
I S R E T A C

T I E N C R N O Y P
THE ANSWER
IS...
A S Y M M E T R I C

E N C R Y P T I O N
USE THE LETTERS
TO SPELL THE
L C I WORD.
P B P - Y K E

I N T U R E A S F R R T U C
THE ANSWER
IS...
P U B L I C - K E Y

I N F R A S T R U C T U R E
USE THE LETTERS
TO SPELL THE
WORD.
O T P Y R C - M M C O U N I C T I A N O
THE ANSWER
IS...
C R Y P T O - C O M M U N I C A T I O N
THANK YOU!

You might also like