Cryptography: Presented by
Cryptography: Presented by
Cryptography: Presented by
PRESENTED BY
E-MAIL-ID:
rekhasheel@gmail.com
1
ABSTRACT
Cryptography has a long and colourful history. Historically, four groups
of people have used and contributed to the art of cryptography; the military,
the diplomatic corps, diarists, and lovers. Of these the military has had the
most important role and has shaped the field. Within military organizations,
the messages to be encrypted have traditionally been given to poorly paid
code clerks for encryption and transmission. The sheer volume of messages
prevented this work from being done by a few elite specialists. Until the
advent of computers, one of the main constraints on cryptography had been
the ability of the code clerk to perform the necessary transformations, often
on a battlefield with little equipment. An additional constraint has been the
difficulty in switching over quickly from one cryptographic method to another
one, since this entails retraining a large number of people.
What is cryptography:
Cryptography is the field concerned with linguistic and mathematical
techniques for securing information, particularly in communications.
Historically, cryptography was concerned solely with encryption; that is,
means of converting information from its normal, comprehensible form into
an incomprehensible format, rendering it unreadable without secret
knowledge
2
communications, such as those of spies, military leaders, and diplomats.
In recent decades, however, the field of cryptography has expanded its
remit: modern cryptography provides mechanisms for more than just
keeping secrets and has a variety of applications including, for example,
authentication, digital signatures, electronic voting and digital cash.
Moreover, people without extraordinary needs for secrecy use
cryptographic technology, which is often built transparently into much of
computing and telecommunications infrastructure.
History of cryptography:
Cryptography has had a long and colourful history. Generally, the earliest
forms of secret writing (now collectively termed classical cryptography)
required only pen and paper. The two main categories of classical ciphers are
transposition ciphers, which rearrange the order of letters in a message, and
substitution ciphers, which systematically replace letters or groups of letters
with other letters or groups of letters. One of the earliest and simplest
substitution ciphers was the Caesar cipher, used by Julius Caesar. Text
encrypted by classical ciphers tends to reveal a certain statistical information
about the plaintext. By using this information, classical ciphers are easily
broken. Classical ciphers still enjoy popularity today, though mostly as
puzzles.
3
which use an alphabet of around 26 letters (depending on the language).
Computer ciphers are also much more resistant to cryptanalysis; few are
susceptible to a ciphertext-only attack.
Symmetric key ciphers can be broadly grouped into block ciphers and stream
ciphers. Stream ciphers encrypt one bit at a time, in contrast to a block
cipher, which operates on a group of bits (a "block") of a certain length all in
one go. Depending on the mode of operation, block ciphers can be
implemented as self-synchronizing stream ciphers (CFB mode). Likewise,
stream ciphers can be made to work on individual blocks of plaintext at a
time. Thus, there is some duality between the two. The block ciphers
4
DES(Data encrption standard), IDEA (International data encrption
algorithm)and AES(Advanced encryption standard), and the stream cipher
RC4, are among the most well-known symmetric key ciphers.
In public key encryption there are two keys used, a public and a private
key, with the public key for encryption and the private key for decryption. It
must be difficult to derive the private key from the public key. This means
that someone can freely send their public key out over an insecure channel
and yet be sure that only they can decrypt messages encrypted with it.
In public key cryptography, the private key is generally kept secret, while
the public key may be widely distributed. In a sense, one key "locks" a lock;
while the other is required to unlock it. It should not be possible to deduce
the private key of a pair given the public key.
5
Use of cryptography: for Secure communications
Applications of cryptography:
1.Key management
Users must be able to securely obtain a key pair suited to their efficiency
and security needs. Users must be able to legitimately obtain others' public
keys; otherwise, an intruder can either change public keys listed in a
directory, or impersonate another user. Certificates are used for this
purpose. Certificates must be unforgeable. The issuance of certificates must
proceed in a secure way, impervious to attack. In particular, the issuer must
6
authenticate the identity and the public key of an individual before issuing a
certificate to that individual.
2.Electronic commerce
7
digital signature can replace a handwritten signature or a credit-card
authorization, and public-key encryption can provide confidentiality.
2.2 IKP
S/MIME
8
does not provide any security services. The purpose of S/MIME is to define
such services, following the syntax given in PKCS #7 for digital signatures
and encryption.
IPSEC
CAPIs:
PGP
9
platforms. It provides message encryption, digital signatures, data
compression, and e-mail compatibility.
U.S. versions of PGP have been bound by Federal export laws due to their
use of export-controlled cryptosystems, but recent relaxations of the U.S.
export restrictions will eliminate several such obstacles.
Cryptography standards
ANSI X9 standard
ISO Standard
10
The Internet Engineering Task Force (IETF) has evolved to become the
primary international forum for standardization of protocols used in IP
networking environments. IETF activities are divided into several functional
areas; within the Security Area, several working groups have been active in
defining security protocols and infrastructure facilities. Extensive information
on IETF work is available at http://www.ietf.org/, including working group
charters, working documents (Internet-Drafts), and published specifications
(RFCs). RFCs are issued as standards-track, Informational, and Experimental
documents; the standards-track documents advance through three maturity
levels (Proposed Standard, Draft Standard, and Full Standard).
1.Legal disclaimer
2.Government Involment
11