0% found this document useful (0 votes)
3 views16 pages

Cryptography

The document provides an overview of cryptography, detailing its purpose of transforming data into an unreadable format for integrity, confidentiality, and authenticity. It explains two main types of cryptography: symmetric-key, which uses a single shared key for encryption and decryption, and asymmetric-key, which employs a pair of keys (public and private) for secure communication. Examples of encryption methods, such as the shift cipher, are also included to illustrate the concepts.

Uploaded by

gooogly755
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views16 pages

Cryptography

The document provides an overview of cryptography, detailing its purpose of transforming data into an unreadable format for integrity, confidentiality, and authenticity. It explains two main types of cryptography: symmetric-key, which uses a single shared key for encryption and decryption, and asymmetric-key, which employs a pair of keys (public and private) for secure communication. Examples of encryption methods, such as the shift cipher, are also included to illustrate the concepts.

Uploaded by

gooogly755
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16

Cryptography

30.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
30-1 INTRODUCTION

Cryptography transforms data into an


unreadable format using algorithms and
keys to ensure its integrity, confidentiality,
and authenticity.

30.2
Figure 30.1 Cryptography components

30.3
Figure 30.2 Categories of cryptography

30.4
Symmetric-key cryptography
 It is an encryption system where the
sender and receiver of a message
use a single common key to encrypt
and decrypt messages.
 It is faster and simpler but the
problem is that the sender and
receiver have to somehow exchange
keys securely

30.5
Figure 30.3 Symmetric-key cryptography

30.6
Note

In symmetric-key cryptography, the


same key is used by the sender
(for encryption)
and the receiver (for decryption).
The key is shared.

30.7
Asymmetric Key
Cryptography
In Asymmetric Key Cryptography, a pair of keys is
used to encrypt and decrypt information.
 A sender’s public key is used for encryption and a
receiver’s private key is used for decryption.
 Public keys and Private keys are different. Even if
the public key is known by everyone the intended
receiver can only decode it because he alone
knows his private key.
 The most popular asymmetric key cryptography
algorithm is the RSA algorithm.

30.8
Figure 30.4 Asymmetric-key cryptography

30.9
Figure 30.6 Comparison between two categories of cryptography

30.10
30-2 SYMMETRIC-KEY CRYPTOGRAPHY

Symmetric-key cryptography started many years ago


when people needed to exchange secrets (for example,
in a war). We still mainly use symmetric-key
cryptography in our network security.

30.11
Figure 30.7 Traditional ciphers

30.12
Note

A substitution cipher replaces one


symbol with another.
Monoalphabetic replaces the same symbol
with the same another symbol.
Polyalphabetic replaces the same symbol
with different symbols at each occurrence.

30.13
Note

The shift cipher is sometimes referred to


as the Caesar cipher. (monoalphabetic)

30.14
Example 30.3

Use the shift cipher with key = 15 to encrypt the message


“HELLO.”

Solution
We encrypt one character at a time. Each character is
shifted 15 characters “down”. Letter H is encrypted to W.
Letter E is encrypted to T. The first L is encrypted to A.
The second L is also encrypted to A. And O is encrypted
to D. The cipher text is WTAAD.

30.15
Example 30.4

Use the shift cipher with key = 15 to decrypt the message


“WTAAD.”

Solution
We decrypt one character at a time. Each character is
shifted 15 characters “up”. Letter W is decrypted to H.
Letter T is decrypted to E. The first A is decrypted to L.
The second A is decrypted to L. And, finally, D is
decrypted to O. The plaintext is HELLO.

30.16

You might also like