160 likes | 385 Views
Cryptography and Network Security. Professor Dr. M. Ismail Jabiullah Department of Software Engineering Daffodil International University. Topics. Cryptography Cryptographic Terms Cryptographic Components Encryption/Decryption Types of Cryptographic Algorithms Symmetric Key Cryptography
E N D
Cryptography and Network Security Professor Dr. M. Ismail Jabiullah Department of Software Engineering Daffodil International University
Topics • Cryptography • Cryptographic Terms • Cryptographic Components • Encryption/Decryption • Types of Cryptographic Algorithms • Symmetric Key Cryptography • Caesar Cipher • Concepts • Problems
0 1 2 3 4 5 6 7 8 9 10 11 12 A B C D E F G H I J K L M 13 14 15 16 17 18 19 20 21 22 23 24 25 N O P Q R S T U V W X Y Z Text space for writing documents
Plaintext in KKey Algorithm Ciphertext in Ciphertext in Key Algorithm Plaintext in Text Number Number Text ~ Text Number Number Text C 2 K = 4 6 G G 6 K = 4 2 C O 14 18 S S 18 14 O M 12 Forward 16 Q Q 16 Backward 12 M P 15 19 T T 19 15 P U 20 24 Y Y 24 20 U T 19 23 X X 23 19 T E 4 8 I I 8 4 E R 17 21 V V 21 17 R Caesar Cipher Ciphertext : GSQTYXIV Plaintext : COMPUTER
Caesar Cipher Perform the Encryption/decryption operation with key value 5 COME HERE PAY MORE MONEY
Caesar Cipher • Julius Caesar • Process: • Replace each letter of the alphabet with letter standing three places further down the alphabet. • The alphabet is wrapped around, so that the letter following Z is A. • Advantages: • Simply try all possible 25 ways. • Key values are within 25. • Characteristics • The encryption and decryption algorithms are known. • There are only 25 keys to try. • The language of the plaintext is known and easily recognizable.
Cryptography Components • Plaintext • Sender • Receiver • Encryption Algorithm • Ciphertext • Decryption Algorithm
Key Elements Plaintext = P Encryption Algorithm = E Decryption Algorithm = D Ciphertext = C Key = K
Symmetric-key Cryptography Or Single Key Cryptography Private Key Cryptography
Public-key Cryptography Public-key algorithms are more efficient for short messages.
Cryptography Algorithms in the world are in two types: • Symmetric-key Cryptography Algorithms or • Secret key Cryptography Algorithms or • Single key Cryptography Algorithms • Asymmetric-key Cryptography Algorithms or • Public key Cryptography Algorithms or • Public-Private key Cryptography Algorithms
Problems • Perform Encryption and Decryption for at least 3 plaintext with key values more than 15.