Anda di halaman 1dari 20

I N T H E N A ME OF A LLA H , T H E MOS T ME R CI F UL A N D T H E MOS T B E N EF I CI EN T

INTRODUCTION
Name: Adeel Ahmad Name : Ahmad Aqeel Name : M. Arqam Ayub

Roll No.: 8909 Roll No.: 6651 Roll No.: 6647

Class : BSSE ( 2nd Semester )

Subject : Discrete Structure

Topic : Cryptography
Context
• What is Cryptography?
• Terminology of cryptography.
• Cycle of cryptography.
• Components of cryptography.
• Types of cryptography.
• Symmetric
• Asymmetric

• Simple ciphers.
• Caesar cipher.
• Shift Cipher.
• Vigenere cipher.

• Frequency analysis.
• Applications.
• Summary.
Cryptography
• Cryptography derived from Greek word.
• kryptos--hidden
• graphein--writing.
• Cryptography is the practice and study
of technique for securing
communication and data in the
presence of adversaries.
Terminology of Cryptography
• Basic goal is to send message that no one but expected
recipient can read.
• Method to send secret messages using a code.
• Cryptanalysis: Trying to break code and read those
messages.
Cycle of cryptography
FUN – PT 1562 – key – CT
1562 + key - CT FUN -- PT
Sender Untrusted Individual Receiver
Components of Cryptography cycle
• Plain-text : A message in its original
form.
• Cipher-text : A message in coded
form.
• Encryption : Process of transforming
plain-text to cipher-text.
• Decryption : Transforming cipher-text
to plain-text.
• Encryption Algorithm / Cipher : the
method used for encryption
Types of Cryptography

1. Symmetric Cryptography

2. Asymmetric Cryptography
Symmetric Cryptography
• Same Key used.
• End-to-end cryptography.
• Fast.

Example :
• Email Password.
Asymmetric Cryptography
• Different key used.
• Public and private keys.
• Side-by-side cryptography.
• Slow.

Examples :
• Online Portal
Simple Ciphers
• Originally , cryptography was performed by hand.
• Goal was to protect message sent by courier.
• E.g War was a popular time to use them.
Types
• Caesar Cipher.
• Shift Cipher.
• Substitution Cipher.
• Vigenere Cipher.
Caesar Cipher
• Each letter in a message is substituted by another that is 3
letter away.
• A becomes D.
• P becomes S.
Examples :
ATTACK AT RIPHAH
DWWDFN DW ULSKDK
Shift Cipher
• Generic version of Caesar cipher.
• Each letter is shifted by N , In Caesar cipher N=3.
Examples:
N=10
ATTACK AT DAWN
KDDKMU KD NKGX
Caesar and Shift -- Cryptanalysis
• Hacker – break this
• Higher IQ level.
• Using brute-force – possible values of N (26).
• Inefficient but workable.
Substitution Cipher
• Generate a random set of substitution for each letter.
• Always 1:1 correspondence.
Examples :
ATTACK AT DAWN
QYYQAV QY WQID
• Cryptanalysis : brute-force , possible letter combination ,
26 ! ways
Frequency Analysis
• A cryptanalysis technique described in the 9th century
by Al-Kandi in Iraq.
• Not all letters in a language occur with same frequency.
Languages have certain features (English Language).
• E is the most common.
• Vowels are about 40 %.
• Vowels are tend to be separated by consonants.
• Q tends to be followed by U etc.
Vigenere Cipher
• Poly-Alphabetic cipher.
• One plain-text letter can become different ciphers letters.
Example :
ATTACK AT DAWN
MONKEY MO NKEY
MHGKGII MH QKAL
Applications of Cryptography
• Secret sharing.
• E-commerce.
• https.
• Secure communication.
• End-to-end encryption.
• Electronic money.
Summary
• All previous techniques have two basics components.
1. Algorithm .
2. Key.
• When using this, key is secret but algorithm is not.
• Cryptography is a type of mathematics that is dedicated
to secret codes.
• We discussed many times of simple ciphers, all have their
own algorithm and key.
Thank You

Anda mungkin juga menyukai