Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Swapnil S. Dalve
Department of Computer Science
Dr. Babasaheb Nandurkar Collage Of Physical Education
Yavatmal
Email: Swapnil_dalve@rediffmail.com
Cryptography
INDEX
ABSTRACT
1. INTRODUCTION
1.1 CRYPTOGRAPHY
1.2 CRYPTANYLASIS
2. TERMS RELATED TO CRYPTOGRAPHY
3. TYPES OF CRYPTOGRAPHIC ALGORITHMS
3.1 SYMMETRIC KEY CRYPTOGRAPHY
3.1.1 BLOCK CIPHER
3.1.2 STREAM CIPHER
3.2 ASYMMETRIC KEY CRYPTOGRAPHY
3.2.1 RSA
3.2.2 DIGITAL SIGNATURE
3.3 HASH FUNCTIONS
4. CLASSICAL ENCRYPTION TECHNIQUES
4.1. SUBSTITUTION TECHNIQUE
4.2 TRANSPOSITION TECHNIQUE
5. WIDELY USE OF SYMMETRIC KEY ALGORITHM
5.1 DES
5.2 AES
5.3 IDES
6. CONCLUSION AND FUTURE SCOPE
7. REFERENCES AND FURTHER READING
Cryptography
ABSTRACT:
The increased use of computer & communication systems by industry has increased the theft of proprietary
information. Although these threats may require a variety of counter measures, encryption is a primary method
protecting valuable electronic information. Cryptography is probably the most important aspect of
communication and network security.
Today's cryptography is more than encryption and decryption.
Authentication is as fundamentally a part of our lives as privacy. We use authentication throughout our everyday
lives - when we sign our name to some document for instance - and, as we move to a world where our decisions
and agreements are communicated electronically, we need to have electronic techniques for providing
authentication. Cryptography provides mechanisms for such procedures. A digital signature binds a document
to the possessor of a particular key, while a digital timestamp binds a document to its creation at a particular
time. These cryptographic mechanisms can be used to control access to a shared disk drive, a high security
installation, or a pay-per-view TV channel.
While modern cryptography is growing increasingly diverse,
cryptography is fundamentally based on problems that are difficult to solve. A problem may be difficult because
its solution requires some secret knowledge, such as decrypting an encrypted message or signing some digital
document. The problem may also be hard because it is intrinsically difficult to complete, such as finding a
message that produces a given hash value. As we can see that designing the hash functions such that the key
generation and key management become more effective, efficient and dynamic.
Day by day the problem of having secured transactions on network is becoming critical. Its a challenging job to
define more versatile hash functions in front of the designers. Our paper discusses the status-co and
improvements in hash functions so as to make them more compatible in this world of threats and attacks.
Cryptography
1. INTRODUCTION
1.1 Cryptography:
Cryptography is a Greek word kryptos hidden, secret and graphien Writing. It means secret writing of
messages or files (data). Cryptography is art and science of preparing coded or protected communications
through messages. Cryptography is the practice and study of hiding information using secret key of codes. In
cryptography the original communication (message) is called as clear text or plaintext.
The cryptography and cryptology are the terms used interchangeably by the academicians and researchers. The
cryptography is important while communicating over a untrusted or trusted medium. The telecommunication
and an internet are widely used network and many communications and transaction takes place on the internet.
For the safe communication there are specific security requirements which include:
Privacy/Confidentiality: the process to confirm that the message has been read by only intended
receiver.
Integrity: Integrity the process in which the receiver ensured that the message has not be altered in
any way from original.
Non-repudiation: It is the process that ensures that the sender really sends this message.
The cryptography protects the data from theft or alteration. It is useful for user authentication.
There are three types of cryptographic schemes.
1) Secret Key or Symmetric cryptography algorithm
2) Public Key or Asymmetric cryptography algorithm
3) Hash Function.
The scheme for the cryptography is shown on following fig.
Plain
text
Cipher
Text
This fig. shows unencrypted data called Plaintext and encrypted data called Cipher text. The data is encrypted
with the help of suitable cryptographic scheme.
1.2 Cryptanalysis:
Cryptanalysis is the process of studding various methods for obtaining the meaning of encrypted information.
Cryptanalysis is the study of cipher text, cipher or encrypted message. Cryptanalysis is used to gain the access to
the content of encrypted messages, even if we dont know the secret key. Cryptanalysis is known as breaking of
the cipher, cipher text or encrypted messages. The main goal of cryptanalysis is to fine some weakness or
insecurity in cryptographic scheme. Cryptanalysis is the common misconception that can be broken every
encrypted method.
Cryptography
A sender uses the key to encrypt the plaintext. This encrypted plaintext sends to the receiver. The receiver uses
the same key (Set of rules) to decrypt the cipher text and recover the plaintext or the original message.
Cryptography
A single key is used for encryption and decryption. Hence secret key cryptography is called as symmetric
encryption algorithm.
ithm. The secret key must be known to sender and receiver also. The secret key cryptography
faces the biggest difficulty that is distribution of key.
The encryption / secret key cryptography scheme is categorized into two types.
1) Block Cipher
2) Stream Cipher
3.1.1
Block Cipher : Block cipher is works on one block of data at a time. It uses the same key on each
block. In general the same plaintext block always encrypt to the cipher text.
3.1.2
Stream Cipher : Stream cipher is works on a single bit or byte or computer word at a time. In this
scheme the key is constantly changing the security of this scheme depends on key stream generator.
Adleman)
RSA (Rivest-Shamir-Adleman)
Digital Signature Algorithm (DSA)
RSA (Rivest-Shamir-Adleman)
Adleman) :
Rivest-Shamir-Adleman
dleman is the most commonly used asymmetric algorithm (Public Key Algorithm). RSA is an
algorithm used by modern computers to encrypt and decrypt messages. In RSA user creates and then publishes
the product of two large prime numbers, along with an auxilia
auxiliary
ry value as their public key. The prime factor must
be kept secret. RSA involve a public key and private key. The public key can be known to everyone it is used to
encrypt messages. Messages encrypted by using public key can be decrypted only using private key. The keys
for the RSA algorithm are generated the following way:
Choose two different large random prime numbers p and q. Calculate n = p*q.. To encrypt a message m, it is
exponential with a small public exponent e.
For decryption, the recipient of the cipher text
C = m e (mod n)
Compute the multiplicative reverse d = e 1(mod (p-1) * (q-1)) and obtains
cd=me
d = m(mod n).
Cryptography
The private key consists of n, p, q, e and d (where p & q can be omitted). The public key contains only n & e.
The key should be greater than 1024 bits for a reasonable level of security. The following fig. shows the RSA.
In digital signature, sender uses his private key and DS algorithm and encrypt message then send the message to
the receiver. Receiver uses senders public key to validate message and decrypt it.
Cryptography
MD2 (RFC 1319): Designed for systems with limited memory, such as smart cards. (MD2 has been
relegated to historical status, per RFC 6149.)
MD4 (RFC 1320): Developed by Rivest, similar to MD2 but designed specifically for fast processing
in
software. (MD4 has been relegated to historical status, per RFC6150.)
MD5 (RFC 1321): Also developed by Rivest after potential weaknesses were reported in MD4; this
scheme is similar to MD4 but is slower because more manipulation is made to the original data.
Cipher text:
abcdefghIjkimnopqrstuvwxyz
DEFGHIJKLMNOPQRSTUVWXYZABC
Cryptography
If, instead, the cipher line can be any permutation of the 26 alphabetic characters, then there are 26! Or
greater than 4 x 1026 possible keys. This is 10 order of magnitude greater than the key space for DES and would
seem to eliminate brute-force techniques for cryptanalysis approach is referred to as a mono alphabetic
substitution cipher, because a single cipher alphabet (mapping from plain alphabet to cipher alphabet) is used
per message.
Poly alphabetic Cipher: Another way to improve on the simple mono alphabetic technique is to use different
mono alphabetic substitutions as one proceeds through the plaintext message. The general name for this
approach is poly alphabetic substitution cipher. All these techniques have the following features in common:
A set of related mono alphabetic substitution rules is used.
A key determines which particular rule is chosen for a given transformation.
In this scheme, the set of related mono alphabetic substitution rules consist of the 26 Caesar ciphers, with shift 0
through 25. Each cipher is denoted by a key letter which is the cipher text letter that substitute for the plaintext
letter a. thus a Caesar cipher with a shift of 3 is denoted the key value d.
The process of encryption is simple: given a key letter x and a plaintext letter y, the cipher text letter is
at the intersection of the row labeled x and the column labeled y in this case the cipher text is V.
To encrypt a message, a key is needed that is as long as the message. Usually, the key is a repeating
keyword. Example, if the keyword is deceptive, the message we are discovered save yourself is encrypted as
follows:
Key:
deceptivedeceptivedeceptive
Plaintext:
wearediscoveredsaveyourself
Cipher text:
ZICVTWQNGRZGVTWAVZHCQYGLMGJ
One Time Pad Cipher: It is said that the one-time pad is the best cipher anywhere. It is uncrackable as long as
you keep the messages short, use shorthand and abbreviations, remove unnecessary letters, never reuse a pad,
and have a good random source from data. This implementation will take the letters (and letters only) from the
pad and encrypt the letters from your message. It leaves space, newlines, punctuation, numbers and all if the
things that are not A-Z alone. Make sure that your pad is at least as long as the number of characters in your
message, otherwise your message will not be encoded.
e
e
m
t
a
e
t
f
r
e
h
t
p
e
r
a
y
t
Cryptography
Cipher text:
mematrhoryetefeteat
Rout Cipher: In a rout cipher the plaintext is first written out in a grid of given dimension, then read off in a
pattern given in the key.
For example, using the plaintext
Plaintext: we are discovered flee at once.
w r
e e
a d
i
s
c
o r
v e
e d
f
l
e
e
a
t
o
n
c
e
j
x
The key might specify spiral inwards, clockwise, starting from the top right that would give a cipher text of
Cipher text : ejxctedecdaewriorfeonalevse
Columnar transposition: Another simple transposition cipher is called columnar transposition. In this the
message is written out in row of fixed length, and then read of again column by column. If the plaintext is WE
ARE DISCOVERED FLEE AT ONCE we will compose the sentence into a 3 X 5 matrix.
For example:
Key:
Plaintext:
W
I
R
E
E
E
S
E
A
Q
A
C
D
T
K
R
O
F
O
J
E
V
L
N
E
D
E
E
C
U
Cryptography
10
5.2 3DES:
If 56 bit DES is considered to be insure, one can simply run the 56 bit algorithm multiples times taking the 64bit output from one iteration of DES as the input to the next DES iteration, using different encryption key each
time.
For example.
C =Ek3[Dk2[Ek1[P]]]
Where, C = cipher text
P = Plaintext
Ek(x) = Encryption of X using key K.
Dk(y) = Decryption of Y using key K.
Decryption is simple the same operation with the keys reversed.
P = Dk1[Ek2[Dk3[C]]]
3DES uses three keys and three execution of DES algorithm. The function follows an encryption decryption
encryption as shown in following fig.
Cryptography
11
6. CONCLUSION
Cryptography, being an art of encrypting and decrypting confidential information and private messages, should
be implemented in the network security to prevent any leakage and threat.
Cryptography is a particularly interesting field because of the amount of work that is, by necessity, done in
secret. The today, secrecy is not the key to the goodness of a cryptographic algorithm. Regardless of the
mathematical theory behind an algorithm, the best algorithms are those that are well-known and welldocumented because they are also well-tested and well-studied! In fact, time is the only true test of good
cryptography; any cryptographic scheme that stays in use year after year is most likely a good one.
The strength of cryptography lies in the choice (and management) of the keys; longer keys will resist attack
better than shorter keys.
7. REFERENCE
On the Web:
o
o
o
o
Cryptography
12