0% found this document useful (0 votes)
62 views8 pages

Crypto Systems

Cryptography is the art of concealing information to induce secrecy in communication. A cryptosystem uses cryptographic techniques to provide information security, typically consisting of key generation, encryption, and decryption algorithms. The cryptosystem components are plaintext, ciphertext, encryption/decryption keys, and encryption/decryption algorithms. Symmetric key cryptography uses the same key for encryption and decryption, while asymmetric key cryptography uses distinct public and private keys.

Uploaded by

Sona Elsa Johny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views8 pages

Crypto Systems

Cryptography is the art of concealing information to induce secrecy in communication. A cryptosystem uses cryptographic techniques to provide information security, typically consisting of key generation, encryption, and decryption algorithms. The cryptosystem components are plaintext, ciphertext, encryption/decryption keys, and encryption/decryption algorithms. Symmetric key cryptography uses the same key for encryption and decryption, while asymmetric key cryptography uses distinct public and private keys.

Uploaded by

Sona Elsa Johny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

CRYPTOAGRAPHY

DEFINITION
■ Kryptós means “hidden, secret”
■ graphein means “to write, study”
■ So cryptography literally means writing something secretly.
■ The art of concealing information to induce secrecy in the
communication and transmission of sensitive data is termed
Cryptography.
■ Cryptanalysis refers to the process of analysing information systems
in order to understand the hidden aspects of the systems.
CRYPTOSYSTEM

■ A cryptosystem, also called cipher system, is an implementation of


cryptographic techniques and their accompanying infrastructure to
provide information security services.
■ Typically, a cryptosystem consists of three algorithms: one for key
generation, one for encryption, and one for decryption.
■ The term cipher is often used to refer to a pair of algorithms, one for
encryption and one for decryption.
A cryptosystem is a five-tuple (P, C, K, E, D), where
• P is a finite set of possible plaintexts
• C is a finite set of possible cipher texts
• K is a finite set of possible keys
• For each k ∈ K there is an encryption rule ek ∈ E and a
corresponding decryption rule dk ∈ D.
Each ek: P → C and dk: C → P are functions such that
dk(ek(x)) = x for every x ∈ P
COMPONENTS OF A
CRYPTOSYSTEM
■ Plain text
■ Cipher text
■ Encryption key
■ Encryption algorithm
■ Decryption key
■ Decryption algorithm
■ In cryptography, plain text is the information a sender wishes to transmit to a receiver.
■ Cipher text is the disguised message, the scrambled version of the plaintext produced by the
encryption algorithm using a specific encryption key.
■ Encryption key is a value that is known to the sender. The sender inputs the encryption key
into the encryption algorithm along with the plaintext in order to compute the cipher text.
■ Encryption algorithm is a cryptographic algorithm that takes plaintext and an encryption key
as input and generates a cipher text that can only be read if decrypted. There are two types of
key-based encryption, symmetric or secret-key and asymmetric or public-key algorithms.
■ Decryption key is a value that is known to the receiver. The receiver inputs the decryption
key into the decryption algorithm along with the cipher text in order to compute the plaintext.
■ Decryption algorithm is a cryptographic algorithm that takes a cipher text and a decryption
key as input, and outputs a plaintext.
SYMMETRIC KEY CRYPTOSYSTEMS
■ Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the
same key or, less commonly, in which their keys are different, but related in an easily computable way.
■ Symmetric algorithms use the same key for encryption and decryption or the decryption key is easily derived
from the encryption.
■ The symmetric key cryptosystems are classified as monoalphabetic substitution cipher, polyalphabetic
substitution cipher, transposition cipher and stream cipher based on the ciphers used in them.
■ Some examples of symmetric key cryptography include:
■ Advanced Encryption Standard (AES)
■ Data Encryption Standard (DES)
■ International Data Encryption Algorithm (IDEA)
■ Blowfish
■ RC4 (Rivest Cipher 4)
■ RC5 (Rivest Cipher 5)
RC6 (Rivest Cipher 6)
ASYMMETRIC KEY
CRYPTOSYSTEMS
■ The revolutionary idea of asymmetric-key cryptography also known as public key cryptography
was introduced in the 1970s by Diffie and Hellman.
■ Their idea was that it might be possible to devise a cryptosystem in which there are two distinct
keys
■ A public key would be used to encrypt the plaintext and a private key would enable the cipher
text to be decrypted. Although different , two parts of the key pair are mathematically connected.
■ Examples of well-regarded asymmetric key techniques for varied purposes include:
■ Diffie–Hellman key exchange protocol
■ DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
ElGamal
RSA cryptosystem
Rabin cryptosystem
Goldwasser Micali Cryptosystem

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy