Sie sind auf Seite 1von 12
Submitted By : Chandan Gautam (CSE „A‟) Reg.No:350074040 Guided By: L Ramalingam ,Sr. Lecturer Department

Submitted By :

Chandan Gautam (CSE „A‟)

Reg.No:350074040

Guided By:

L Ramalingam ,Sr. Lecturer

Department of Computer Science Engineering

(AVIT)
(AVIT)

1

is the science of writing  Cryptography messages in secret codes .  Cryptography, a
is the science of writing  Cryptography messages in secret codes .  Cryptography, a

is the science of writing

Cryptography

messages in secret codes .

Cryptography, a word with Greek “SECRET WRITING”. Cryptography components :

PLAIN TEXT

CIPHER TEXT ENCRYPTION DECRYPTION

origins ,means

Continued

WRITING”.  Cryptography components : PLAIN TEXT CIPHER TEXT ENCRYPTION DECRYPTION origins ,means Continued 2

2

Figure 16-2

Plaintext : It is original message ,before being transformed .The data are not encrypted.

Ciphertext : After the message is transformed . The data are encrypted.

Alice : Alice is the person who needs to send secure data.

Bob : Bob is the recipient of the data. Eve : Eve is the person who somehow disturbs the communication between Alice and Bob.

Continued

of the data.  Eve : Eve is the person who somehow disturbs the communication between
 Information is often stored and transmitted in a file.  Encryption algorithm transforms the

Information is often stored and transmitted in a file.

Encryption algorithm transforms the plain text into cipher text.

A plain text file uses a common encoding format such as ASCII or UNICODE to represent the

character of file.

Encryption is a translation of a file into a format that hides the content from EVE ;secret code;ciphertext.

Continued

Encryption is a translation of a file into a format that hides the content from EVE

4

 After sending the information by ALICE , BOB receive the information and decrypt the

After sending the information by ALICE , BOB receive the information and decrypt the data.

A decryption algorithm transforms the ciphertext

back into plaintext.

For decrypting the data receiver uses three types of key :

plaintext.  For decrypting the data receiver uses three types of key : Secret key Public

Secret key Public key Private key

plaintext.  For decrypting the data receiver uses three types of key : Secret key Public

Continued

5

DATA FLOW DIAGRAM

EVE
EVE
DATA FLOW DIAGRAM EVE PLAIN TEXT PLAIN TEXT RECEIVER ENCRYPTION DECRYPTION CIPHER TEXT SENDER Continued 6
PLAIN TEXT
PLAIN
TEXT
DATA FLOW DIAGRAM EVE PLAIN TEXT PLAIN TEXT RECEIVER ENCRYPTION DECRYPTION CIPHER TEXT SENDER Continued 6
PLAIN TEXT
PLAIN
TEXT
DATA FLOW DIAGRAM EVE PLAIN TEXT PLAIN TEXT RECEIVER ENCRYPTION DECRYPTION CIPHER TEXT SENDER Continued 6
DATA FLOW DIAGRAM EVE PLAIN TEXT PLAIN TEXT RECEIVER ENCRYPTION DECRYPTION CIPHER TEXT SENDER Continued 6
RECEIVER
RECEIVER

ENCRYPTION

DECRYPTION

CIPHER TEXT
CIPHER
TEXT
SENDER
SENDER

Continued

DATA FLOW DIAGRAM EVE PLAIN TEXT PLAIN TEXT RECEIVER ENCRYPTION DECRYPTION CIPHER TEXT SENDER Continued 6

6

 Two categories : Symmetric key cryptography Asymmetric key cryptography  In symmetric key cryptography,the

Two categories :

 Two categories : Symmetric key cryptography Asymmetric key cryptography  In symmetric key cryptography,the same

Symmetric key cryptography Asymmetric key cryptography

In symmetric key cryptography,the same key is used by the sender(for Encryption) and the receiver(for Decryption) . In case of symmetric key,the key is shared.

Continued

sender(for Encryption) and the receiver(for Decryption) .  In case of symmetric key,the key is shared.

7

In asymmetric key cryptography,two types of key is used :

Alice
Alice
Bob
Bob
 In asymmetric key cryptography,two types of key is used : Alice Bob Continued 8
 In asymmetric key cryptography,two types of key is used : Alice Bob Continued 8

Continued

8

◦ DES encrypts and decrypts at the bit level. ◦ The plaintext are broken into

DES encrypts and decrypts at the bit level.

The plaintext are broken into segments of 64 bits.

Each section is encrypted using a 56-bit key. (Fig.

16.3)

Every bit of ciphertext depends on every bit of

plaintext and the key.

It is very difficult to guess the bits of plaintext from the bits of ciphertext .

plaintext and the key. ◦ It is very difficult to guess the bits of plaintext from

Continued

 Privacy & Secruty : E-mail message,Wireless network  Confidentiality :Personal records,Transaction records .

Privacy & Secruty : E-mail message,Wireless network

Confidentiality :Personal records,Transaction records . Authentication : Digital signatures,Login.

Intellectual Property : Copy protection

records .  Authentication : Digital signatures,Login.  Intellectual Property : Copy protection Continued 10

Continued

10

 Advantage ◦ Individuals can post their public key on their Web site. ◦ The

Advantage

 Advantage ◦ Individuals can post their public key on their Web site. ◦ The number

Individuals can post their public key on their Web site.

The number of the keys is only twice of the number of user.

Disadvantage

The complexity of the algorithm: calculating the ciphertext from plaintext using the long keys takes a lot of time.

◦ The complexity of the algorithm: calculating the ciphertext from plaintext using the long keys takes
CHANDAN GAUTAM B.E. 3 r d Yr CSE VMU ,AVIT THANK YOU

CHANDAN GAUTAM B.E. 3 rd Yr CSE VMU ,AVIT

CHANDAN GAUTAM B.E. 3 r d Yr CSE VMU ,AVIT THANK YOU

THANK YOU

CHANDAN GAUTAM B.E. 3 r d Yr CSE VMU ,AVIT THANK YOU