TO Cryptography: Chapter - 4
TO Cryptography: Chapter - 4
TO
CRYPTOGRAPHY
CHAPTER - 4
Humans and
Animals were used
to deliver
messages.
This was not a
safe way to send
secret messages.
So symbols or
coding was used
in later years by
the army specially
and now by e-com
ATMs etc.
A PARTICULAR SIGN CORRESPONDS TO
A PARTICULAR SUIT AND IS PREDEFINED
WHICH IS KNOWN TO BOTH.
WHEN A MESSAGE IS NOT UNDERSTOOD
BY ANY OTHER BUT THE RECEIVER IS
“CRYPTOGRAPHY”.
GREEK WORD = “KRYPTO” = “SECRET
WRITING”.
USED AT ATMS, COMPUTER PASSWORDS
AND E-COMMERCE.
ENCRYPTION ON ORIGINAL DATA CONVERTED INTO UNREADABLE
FORMATIS CALLED CIPHER TEXT.
plaintext:
abcdefghijklmnopqrstuvwxyz
mnbvcxzasdfghjklpoiuytrewq
ciphertext:
E.g.: Plaintext: bob. i love you. alice
ciphertext: nkn. s gktc wky. mgsbc
Key: the mapping from the set of 26 letters to the
set of 26 letters
7
NEED FOR CRYPTOGRAPHY
Frank Encrypted
Message
22
Alice verifies signature
Bob sends digitally and integrity of
signed message: digitally signed
message:
large
message H: Hash encrypted
m function H(m)
msg digest
-
KB(H(m))
Bob’s digital large
private signature message
key K - m Bob’s digital
(encrypt)
B public
signature
key K +
encrypted H: Hash B (decrypt)
msg digest function
-
+ KB(H(m))
H(m) H(m)
equal
? 23
Certification Authorities
• Certification authority (CA): binds public key to
particular entity, E.
• E (person, router) registers its public key with CA.
– E provides “proof of identity” to CA.
– CA creates certificate binding E to its public key.
– certificate containing E’s public key digitally signed by
CA – CA says “this is E’s public key”
Bob’s digital
+
public + signature K
B
key K B (encrypt)
CA
certificate for Bob’s
Bob’s private -
K public key, signed by
identifying key CA
CA 24
information
Certificates: summary
• Primary standard X.509 (RFC 2459)
• Certificate contains:
– Issuer name
– Entity name, address, domain name, etc.
– Entity’s public key
– Digital signature (signed with issuer’s private key)
• Public-Key Infrastructure (PKI)
– Certificates and certification authorities
– Often considered “heavy”
25
Advantages
• Helps prevent fraudulence and
impersonation and imposters.
• Robust computer based technology.
• Uses Asymmetric crypto system.
• The ensure integrity of the public key as a
third party is called for the verification.
• Visa and Master card have jointly developed
a protocol to check secure transactions on
the net.