0% found this document useful (0 votes)
7 views20 pages

Untitled Designn

AA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views20 pages

Untitled Designn

AA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

CRYPTOGRAPH

PROTECTING PRIVACY THROUGH UNBREAKABLE


CODE.

Y
PRAVEEN D PRUTHVI S RANJITH PRABHU
RNNM23MC105 BORKAR
NNM23MC106 NNM23MC113
INTRODUCTIO
N
• Cryptography is the science and art of securing communication by converting information

into a format that is unreadable to unauthorized users, ensuring data privacy and integrity.

• It plays a crucial role in modern digital communication, safeguarding sensitive information

from cyber threats and attacks.

• Cryptography has a long history, dating back to ancient times, but it has evolved

significantly with advances in mathematics and computing. Today, it is the foundation of

technologies like secure messaging, online banking, e-commerce, and blockchain.

• Cryptography means secret writing, a tool for protecting information from unauthorized

access.
HISTORY
• A long time ago, people started using secret writing to
keep their messages safe.
• The oldest secret writing was found on a clay tablet from
Egypt that is over 4,000 years old. It had special pictures
called hieroglyphics written by a scribe. In Egypt, some
people wrote messages with tricky symbols so others
would try to guess what they meant.
• In Babylon, they used funny signs called colophons to hide
MISSION
messages by using numbers instead of letters.
• About 2,500 years ago, Spartan soldiers used a tool
called the sky-tale, which was a stick with a piece of
paper wrapped around it to keep their messages a secret.
All these clever ways of writing helped keep important
information safe, especially for soldiers in battles.
• When sending messages from a sender (S) to a recipient (R), the message often goes

through a third party (T), who acts as the delivery medium.

• However, there is a risk that an outsider (O), known as an interceptor or intruder, might try

to access the message after it is sent. This can happen in several ways: they could block

the message from reaching R, intercept it to read its contents, modify it to change the

information, or fabricate a fake message to make it look like it came from S.

• These actions can compromise the message's availability, confidentiality, and integrity.

Fortunately, encryption helps protect messages against these vulnerabilities, making it a

crucial tool for secure communication in an insecure environment.


TERMINOLOG
Y
• Ciphertext: The encrypted form of a message is known as ciphertext or scrambled

message

produced as output. It depends on the plaintext and the secret key. For a given message,

two

different keys will produce two different ciphertexts.

• Cryptanalysis: The process of attempting to discover the plaintext or key is known as

cryptanalysis.

• Cryptology: The art of devising ciphers (cryptography) and breaking them (cryptanalysis)

is

collectively known as cryptology.


TERMINOLOG
Y
• Description algorithm: This is essentially the encryption algorithm run in reverse. It takes

the

ciphertext and same secret key and produces the original plaintext.

• Encryption: The process of changing the plaintext into ciphertext.

• Encryption algorithm: The encryption algorithm performs various substitutions and

transformations on the plaintext.

• Plaintext: The original form of a message is known as plaintext.


ENCRYPTION
Encryption is a vital component of data security, used to protect sensitive information by

converting it into an unreadable format. There are several types of encryption, which can be

broadly classified into two categories:

1. symmetric encryption

2. asymmetric encryption.
SYMMETRIC
ENCRYPTION
Symmetric encryption uses the same key to both lock (encrypt) and unlock (decrypt)

messages. This means that if we have a message ( P ), we can encrypt it using a key ( K ) to

get ciphertext ( C ) and then use the same key ( K ) to get back the original message. Since

both processes use the same key, symmetric encryption is quick and effi cient, making it great

for handling large amounts of data. However, the downside is that if someone else gets hold

of the key, they can easily read all the messages.


ASYMMETRIC
ENCRYPTION.
Asymmetric encryption uses two different keys: one key (called the public key) to lock

(encrypt) the message and another key (called the private key) to unlock (decrypt) it. This

means that while anyone can use the public key to send a secure message, only the person

with the private key can read it. This makes asymmetric encryption more secure because

even if someone knows the public key, they cannot unlock the messages without the private

key. However, this type of encryption is usually slower and more complex than symmetric

encryption, so it's often used for specific tasks, like securing online transactions
CRYPTANALYSIS
Cryptanalysis is like a puzzle game where someone tries to figure out a secret message that

is hidden. People who do this look at different secret messages and try to find patterns or

clues to understand what the messages say.

They might also try to guess the secret code (called a key) that was used to hide the

message. Sometimes, they find mistakes in how the secret was kept that can help them. It’s a

bit like being a detective, where they use different pieces of information to solve the mystery

of the secret message. There are no strict rules, so they can use any tricks they think of to

find out what the message means.


DATA ENCRYPTION
There are two main types of ways to hide messages so only the right people can read them:

1. substitution ciphers

2. transposition ciphers.
SUBSTITUTION CIPHERS
In a substitution cipher, each letter in a message is swapped with another letter. A famous

example is the Caesar Cipher, where letters are shifted by a certain number. For instance, in a

Caesar Cipher where we shift by 3, "a" becomes "d," "b" becomes "e," and so on. So, the word

"attack" becomes "DWWDFN." We can change how much we shift, and that amount is called

the key. Another way to do this is to use a different arrangement of letters altogether, like

mapping "a" to "Q," "b" to "W," and so forth. For example, "attack" would change to

"QZZQEA." Even if someone knows the substitution, there are many possible keys, making it

hard to guess.
TRANSPOSITION
CIPHERS
Transposition ciphers work differently. Instead of swapping letters, they change the order of

the letters in a message but keep the letters themselves the same. For example, if we use a

key like the word "BOENTIKA," we write the message in rows and then read it out in columns

based on the order of the letters in the key. The original message "Please transfer ten

thousand rupees to my Swiss bank account, seven two seven" would be scrambled to form a

different message that looks confusing to anyone who doesn't know the key.
DIGITAL SIGNATURES
A digital signature is a way to prove that a digital message or document is real and has not

been changed. It helps the receiver know that the message comes from a known sender.

Digital signatures are commonly used for software distribution, financial transactions, and

other situations where it's important to prevent forgery.

To understand digital signatures, think of a paper check:

- A check is a physical document that authorizes a payment.

- The signature on the check shows that it's valid, as only the person with the right signature

can create it.

- Once a check is cashed, it can’t be used again, and most changes to it can be easily

spotted.
DIGITAL SIGNATURES
Digital signatures work differently since there are no physical documents. They involve three

main steps:

1. **Key Generation:** A private key and a public key are created.

2. **Signing:** The sender uses the private key to create a unique signature for the message.

3. **Verification:** The recipient uses the public key to check if the signature is valid.

A digital signature includes a header (who sent it), a body (the message), and a signature (a

special code created from the message). The recipient can verify the signature to ensure the

message is authentic and hasn’t been altered. This helps prevent forgery, which can lead to

misinformation online.
TRANSPOSITION
CIPHERS
Transposition ciphers work differently. Instead of swapping letters, they change the order of

the letters in a message but keep the letters themselves the same. For example, if we use a

key like the word "BOENTIKA," we write the message in rows and then read it out in columns

based on the order of the letters in the key. The original message "Please transfer ten

thousand rupees to my Swiss bank account, seven two seven" would be scrambled to form a

different message that looks confusing to anyone who doesn't know the key.
SPEECH CRYPTOGRAPHY
Speech cryptography is the technique of securing spoken communication by transforming

audio signals into a form that is unreadable to anyone who does not have the proper

authorization. This process typically involves encoding the speech using various encryption

algorithms, which can make it diffi cult for unauthorized listeners to intercept or understand

the message. Speech cryptography is especially important in environments where privacy is

crucial, such as in military operations, diplomatic discussions, or confidential business

meetings. The encrypted speech can only be decrypted and understood by someone who

possesses the correct key or password, ensuring that sensitive information remains

confidential. By safeguarding spoken conversations, speech cryptography helps protect

personal privacy and secure important communications from potential eavesdroppers or


SPEECH CRYPTOGRAPHY
Cryptography plays a crucial role in securing blockchain technology. Here’s an example of

how cryptography is used in a blockchain, particularly in the context of Bitcoin:Example:

Bitcoin and Cryptographic HashingTransaction Creation: When a user initiates a Bitcoin

transaction, they create a message that includes details like the sender’s address, the

recipient’s address, and the amount of Bitcoin being transferred.Digital Signatures: To ensure

authenticity and integrity, the sender uses their private key to create a digital signature for

the transaction. This signature proves that the sender authorized the transaction and

prevents anyone else from altering it. The transaction details and the sender's public key are

used to generate the digital signature.Transaction Broadcasting: The signed transaction is

then broadcast to the Bitcoin network. Each node in the network receives the transaction,
SPEECH CRYPTOGRAPHY
Verification: Nodes verify the transaction by using the sender’s public key to check the digital

signature. If the signature is valid and the sender has enough Bitcoin to complete the

transaction, it is considered legitimate.Block Creation: Valid transactions are grouped

together to form a block. Each block contains a cryptographic hash of the previous block,

ensuring the integrity of the entire blockchain. The hash function (SHA-256 for Bitcoin) takes

the block's header (including the hash of the previous block) and creates a unique fixed-size

output. This linking of blocks ensures that if any information in a previous block is changed,

the hash will also change, signaling tampering.Mining: Miners compete to solve a complex

mathematical problem that involves finding a nonce (a random number) that, when hashed

with the block's header, produces a hash that meets certain criteria (e.g., it must start with a
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy