0% found this document useful (0 votes)
13 views19 pages

Daffodil International University Dept. of CSE Information Security

The document provides an overview of cryptography, detailing its two main types: symmetric and asymmetric encryption, along with their characteristics and examples. It also discusses blockchain technology, highlighting its features such as transparency, security, immutability, integrity, anonymity, and decentralization. Additionally, it touches on Bitcoin and Ethereum as applications of blockchain technology, emphasizing their roles in enabling direct online payments and smart contracts.

Uploaded by

mdredwanul38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views19 pages

Daffodil International University Dept. of CSE Information Security

The document provides an overview of cryptography, detailing its two main types: symmetric and asymmetric encryption, along with their characteristics and examples. It also discusses blockchain technology, highlighting its features such as transparency, security, immutability, integrity, anonymity, and decentralization. Additionally, it touches on Bitcoin and Ethereum as applications of blockchain technology, emphasizing their roles in enabling direct online payments and smart contracts.

Uploaded by

mdredwanul38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Daffodil International University

Dept. of CSE
Information Security

Lecture 14
Introduction to Cryptography
Cryptography
Cryptography is the practice of concealing information by converting
plaintext (readable format) into ciphertext (unreadable format) using a key
or encryption scheme.

Fig 1: Encryption Process


Types of Cryptography
Cryptography is categorized into two types according to the number of keys employed for
encryption and decryption.

Symmetric Encryption Asymmetric Encryption


Symmetric Encryption
• Sender and receiver use same digital key to encrypt and decrypt message
• Requires different set of keys for each transaction
• Strength of encryption
-Fixed Length of binary key used to encrypt data
• Sending secret key is a challenge
• Faster and consumes less computational energy than asymmetric key
■ Data Encryption Standard (DES)
• The plaintext and cipher text is of 64 bits and 56 bit encryption key.
• 3DES is used to ensure security
■ Advanced Encryption Standard (AES)
• Most widely used symmetric key encryption
• Uses 128-, 192-, and 256-bit plaintext, cipher text and encryption keys
• Other standards use keys with up to 2,048 bits
Asymmetric Encryption
• Uses two mathematically related digital keys
❖ Public key (widely disseminated)
❖ Private key (kept secret by owner)
• Both keys used to encrypt and decrypt message
• Once key used to encrypt message, same key cannot be used to decrypt message
• Sender uses recipient’s public key to encrypt message; recipient uses private key to
decrypt it
• Slower and consumes more computational energy
• Ex: RSA, DSA Algorithm
Message Digest (One way Hash Function)
• Mathematical algorithm that produces fixed-length number called message or hash
digests. Ex: MD5, SHA.
Features of Blockchain

Transparency Integrity
. 01 04

Features
Security of Anonymity
. 02 05
Blockchai
n

Immutability Decentralization
03 06

7
Blockchain

A blockchain is a constantly growing distributed ledger which keeps


a permanent record of all the transactions that have taken place in a
secure, chronological, and immutable way.

8
Features of Blockchain
1.Transparency is a key feature of blockchain technology, contributing to its trustworthiness
and widespread appeal across various sectors. It refers to the ability of all participants in a
blockchain network to view transactions and data stored on the distributed ledger. This openness
ensures that users can verify and audit transactions independently, promoting accountability and
trust without the need for intermediaries.

2. Security - Cryptographic hashing algorithm is used for hashing. Further fixed-length has
output value is generated irrespective of the input data length. This makes it difficult to hack.
Also, the components that go into block generation increases the difficulty level for hacking.
Immutability is another factor adding to securing information. Thus the systemic aspect of BCT
inherently provides security.

3. Immutability means something that can’t be changed or altered. This is one of the top
blockchain features that help to ensure that the technology will remain as it is – a permanent,
unalterable network.

9
Features of Blockchain
4. Integrity : By design, blockchains are inherently resistant to the modification of data. Blockchain
ledgers are immutable, meaning that if data additions or transactions have been made, it cannot be
edited or deleted. Moreover, blockchains are not only a data structure, but also a timekeeping
mechanism for the data structure. Therefore, proof of the history of data is easily reportable and updated
to the second.
One aspect of blockchain technology that is particularly important for improved data integrity is the
Merkle Tree. This ensures the integrity of the data in the blockchain. A Merkle Tree is a fundamental
component of blockchains which uses cryptographic hash functions.

5. Anonymity : Blockchain offers the feature of anonymity as well. The identity of all the participating
entities is kept anonymous or pseudo anonymous

6. Decentralization : Blockchain technology is a decentralized system, which means that there is no


central authority controlling the network. Instead, the network is made up of a large number of nodes
that work together to verify and validate transactions. Each and every node in the blockchain network
will have the same copy of the ledger.
10
Chain of blocks
Genesis Block

● Decentralized , Distributed ledger


● Chain of Blocks
● Each block has
○ Data Hash : 2Zb1
Hash : 7B2Z Hash : 3DF5
○ Hash Previous Hash : 000
Previous Hash : 2ZB1 Previous Hash : 7B2Z

○ Hash of the previous block

11
Hashing and public key cryptography in Blockchain

Malicious user

:
7B2Z

● Each block contains the hash of previous block


● Public key : User identity
● Private key : Sign in Password

12
Bitcoin
● Is an application of blockchain technology

● Enabled online payments to be transferred directly, without an intermediary.

200 200 201


8 9 1
Idea was published Start of the Bitcoin Fist cryptocurrency
under the Network
pseudonym Satoshi stock exchange is
Nakamoto
launched

13
Bitcoin

● A Peer-to-Peer Electronic Cash System


● Every single person on the network has a copy of the ledger.

14
Ethereum

● Second-largest cryptocurrency platform


● Extends blockchain capabilities with smart contracts
● Smart contract = code running as part of transactions

201 201
3 4
Vitalik Buterin publishes The development of the
the ethereum Ethereum platform was publicly
whitepaper. announced.

15
Smart Contract

● Self-operating computer program

● Automatically executes when specific conditions are met.

● Facilitate the exchange of money, content, property, shares, or anything of

value.
Example :

16
Smart Contract

17
Ethereum Vs Bitcoin

18
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy