0% found this document useful (0 votes)
22 views

Chapter 6 Lesson 1 - Introduction To Cryptography

The document provides an introduction to cryptography including definitions of key terms like plaintext, ciphertext, encryption, decryption, and cryptanalysis. It discusses the history of cryptography from ancient techniques like hieroglyphs to modern ciphers like the Enigma machine. The major types of cryptography - symmetric, asymmetric, and cryptographic techniques like substitution ciphers, transposition ciphers, block ciphers, and stream ciphers are explained. Specific ciphers and algorithms like the Caesar cipher, DES, AES, RSA, and RC4 are also overviewed.

Uploaded by

Mich Deza
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Chapter 6 Lesson 1 - Introduction To Cryptography

The document provides an introduction to cryptography including definitions of key terms like plaintext, ciphertext, encryption, decryption, and cryptanalysis. It discusses the history of cryptography from ancient techniques like hieroglyphs to modern ciphers like the Enigma machine. The major types of cryptography - symmetric, asymmetric, and cryptographic techniques like substitution ciphers, transposition ciphers, block ciphers, and stream ciphers are explained. Specific ciphers and algorithms like the Caesar cipher, DES, AES, RSA, and RC4 are also overviewed.

Uploaded by

Mich Deza
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Chapter 6 Lesson 1:

Introduction to
Cryptography

ROSARIE GILLERA - SANCHEZ


Cryptography
➢ comes from the two Greek words “krypto” which
means secret and “graphein” which means writing

➢ a method of storing and transmitting data in a


particular form so that only those for whom it is
intended can read it
Cryptanalysis

➢ The process of recovering the original message


(plaintext) from an encrypted message (ciphertext)
without knowing the encryption techniques or keys.
Cryptology

➢The science of encryption


➢Includes cryptography and cryptanalysis
Fundamentals of Cryptography

• Plaintext
➢ the original raw text document onto which encryption needs to be
applied

Meet me at 3pm

• Ciphertext
➢ the output of applying encryption to a plaintext

!**z ?* >t xp?


Fundamentals of Cryptography (continued)

• Encryption
➢ process of converting plaintext to a ciphertext using an
encryption algorithm.

• Decryption
➢ process of converting back the ciphertext to the original
message called plaintext
Fundamentals of Cryptography (continued)

• Encryption Algorithm
➢ a mathematical procedure for encryption and decryption
➢ Example: RSA, DES, Caesar, Affine, etc.

• Key length
➢ Choosing an encryption algorithm with an appropriate key
size is an important decision to make. The strength of the
key is usually determined by the key size or the number of
bits.
History of Cryptography

The art of cryptography is considered to be along


with the art of writing. As civilizations evolved, human beings
got organized in tribes, groups, and kingdoms. This led to the
emergence of ideas such as power, battles, supremacy, and
politics. These ideas further fueled the natural need of people
to communicate secretly with selected recipient which in
turn ensured the continuous evolution of cryptography as
well.
History of Cryptography (continued)

• Hieroglyph – the oldest cryptographic technique


➢ Some 4000 years ago, the Egyptians used to communicate by messages
written in hieroglyph. This code was the secret known only to the scribes who
used to transmit messages on behalf of the kings.

Symbols used in hieroglyph


History of Cryptography (continued)
•Caesar Cipher
➢ Used by Julius Caesar with the Roman army
➢ Relies on shifting the letters of a message by an agreed number (3 was
the common choice), the recipient of this message would then shift the
letters back by the same number and obtain the original message.

Encryption using Caesar cipher with 2 (shift) as key


Caesar wheel used as guide for encryption/decryption Sample ciphertext using Caesar cipher
History of Cryptography (continued)
•Vigenere Coding

➢ came into existence in the 15th century, which offered moving letters
in the message with a number of variable places instead of moving
them the same number of places

Sample encryption using Vigenere cipher and Vigenere table


History of Cryptography (continued)
•Enigma Cipher

➢ The invention of mechanical and electromechanical machines


such as the Enigma Rotor Machine provided more advanced
and efficient means of coding the information

Diagram on how the Enigma Rotor Machine works


Two Major Types of Cryptography

❖ Symmetric Cryptography/Cipher
➢ Also known as Shared Key or Private key cryptography
➢ Both parties must use the same key for encryption and decryption. This
means that the encryption key must be shared between the two parties
before any messages can be decrypted.
➢ Examples: Caesar, Affine, Vigenere, Rail Fence, DES, AES/Rijndael

Diagram on how the symmetric cipher using the same private key works
Two Major Types of Cryptography (continued)

❖ Asymmetric Cryptography/Cipher
➢ The encryption key and the decryption keys are separate.
➢ Each person has two keys. One key, the public key, is shared publicly.
The second key, the private key, should never be shared with anyone.
➢ Examples: RSA and Diffie-Hellman

Diagram on how the symmetric cipher using the public and private key works
Cryptographic Techniques

❖ Substitution Cipher
❖ Transposition Cipher
❖ Block Cipher
❖ Stream Cipher
Cryptographic Techniques (continued)

❖ Substitution Cipher
➢ Encrypt plaintext by changing the plaintext one piece at a time

Examples: Caesar, Vernam, ROT-1, Affine, Vigenere


o Caesar Cipher – the key for Caesar serves as the number of shift. For instance, if the key is 3, A
becomes D and B becomes E, etc.
o Vernam Cipher – known as One Time Pad; a simple substitution cipher where the key length
equals the message length.
o ROT-1 – simple substitution cipher used to encode messages on Usenet
o Affine - a type of monoalphabetic substitution cipher, wherein each letter in an alphabet is
mapped to its numeric equivalent, encrypted using simple mathematical function, and
converted back to a letter. The formula used means that each letter encrypts to one letter,
and back again, meaning the cipher is essentially a standard substitution cipher with a rule
governing which letter goes to which.
o Vigenere –polyalphabetic substitution cipher
- Has several Caesar ciphers in sequence with different shift values
Cryptographic Techniques (continued)

❖ Transposition Cipher
➢ Encrypt plaintext by moving small pieces of the message around.
Anagrams are a primitive transposition cipher

Examples: Rail Fence


o Rail Fence – also called zigzag cipher; derives its name from the way in which it
is encoded.
- In rail fence, the plaintext is written downwards and diagonally on successive
“rails” of an imaginary fence, then moving up when we reach the bottom rail.
When we reach the top rail, the message is written downwards again until the
whole plaintext is written out. The message is then read off in rows.
Cryptographic Techniques (continued)

❖ Block Cipher
➢ An encryption algorithm that encrypts a fixed size of n-bits of data – known
as a block – at one time. The usual sizes of each block are 64 bits, 128 bits,
and 256 bits. In cases where bits of plaintext is shorter than the block size,
padding schemes are called into play.

Examples: DES, Triple (3) DES, AES, IDEA, and Blowfish


o Data Encryption Standard (DES) – used to be the most popular block cipher. DES
algorithm became a standard in the US in 1977. However, its already been proven
to be vulnerable to brute force attacks and other cryptanalysis.
o 3DES – a cipher based on DES; it’s practically DES that run three times; many times
stronger than DES but is much slower
o Advanced Encryption Standard (AES) – most widely used block cipher. The longer
the key size, the stronger the encryption.
o Blowfish - unpatented and royalty-free
Cryptographic Techniques (continued)

❖ Stream Cipher
➢ An encryption algorithm that encrypt 1 bit or byte of plaintext at a time. It
uses an infinite stream of pseudorandom bits as the key. For a stream
cipher implementation to remain secure, its pseudorandom generator
should be unpredictable and the key should never be reused.
➢ Are designed to approximate an idealized cipher known as the One-Time
Pad.

Examples: RC4, and other stream cipher that already exist but never gained
the same popularity as RC4 (SALSA, SOSEMANUK, PANAMA)
o RC4 – stands for Rivest Cipher 4; most widely used of all stream ciphers; has been
used in various protocols like WEP and WPA (both security protocols for wireless
networks)
Rivest-Shamir-Adleman (RSA) Algorithm

- most popular and secure public key cryptography algorithm.


- The algorithm capitalizes on the fact that there is no efficient
way to factor very large (100-200 digit) numbers.
11 Best Cryptography Tools in 2023

1. VeraCrypt
2. Kruptos 2 cryptography tools
3. Boxcryptor
4. IBM Security Guardium Data Encryption
5. CertMgr.exe
6. Quantum Numbers Corp
7. Homomorphic Encryption
8. AxCrypt Premium
9. Key-Based Authentication
10.Authentication Token/Security Token
11.Docker

You might also like