Escolar Documentos
Profissional Documentos
Cultura Documentos
Submitted in partial fulfillment of the Requirements for the award of the degree of Bachelor of Technology In Computer Science & Engineering By:
GAGANDEEP SINGH (0651322708/CSE1/2008) GAGANDEEP KAUR(0661322708/CSE1/2008) ISHDEEP SINGH(00913207209/CSE1/2008)
Department of Computer Science & Engineering Guru Tegh Bahadur Institute of Technology Guru Gobind Singh Indraprastha University Dwarka,New Delhi
What is CRYPTOGRAPHY?
y Cryptography, a word with Greek origins,
means SECRET WRITING. y It is the science of writing messages in secret codes. y It is a process to encrypt sensitive information to protect your privacy.
Components of Cryptography
y PLAIN TEXT
It is original message ,before being transformed. The data are not encrypted. y CIPHER TEXT After the message is transformed . The data are encrypted. y Alice Alice is the person who needs to send secure data. y Bob Bob is the recipient of the data.
y Eve
Eve is the person who somehow disturbs the communication between Alice and Bob. y ENCRYPTION Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. y DECRYPTION It is the process of converting encrypted data back into its original form, so it can be understood.
Process of Cryptography
Types of Cryptography
y Symmetric key cryptography
In symmetric key cryptography, the same key is used by the sender(for Encryption) and the receiver(for Decryption) . The key used is called Public key.
In this mode user selects the algorithm for encryption or decryption. y Dynamic mode In this mode system itself selects the algorithm for encryption or decryption randomly.
y XOR XOR cipher is a simple encryption algorithm that operates according to the principles of XOR. With this logic, a string of text can be encrypted by applying the bitwise XOR operator to every character using a given key. To decrypt the output, merely reapplying the key will remove the cipher.
Message digest
y Message-Digest Algorithm is a widely used cryptographic
hash function that produces a 128-bit (16-byte) hash value. It has been employed in a wide variety of security applications, and is also commonly used to check data integrity. However, it has been shown that MD is not collision resistant, so it is not suitable for applications like digital signatures that rely on this property. An MD hash is typically expressed as a 32-digit hexadecimal number. y It was designed by Ron Rivest in 1991.
Applications Of Cryptography
y Privacy & Security : E-mail message, Wireless network
A company may have information that a competitor would like to see, such as information concerning legal or financial problems
Advantages
y Ease-of-use - It is easy to understand. y Reliability- It means that when used as its designer
intended it to be used, will always reveal exactly the information hidden when it is needed (in other words, that the ciphertext will always be recoverable and the recovered data will be the same as to the original plaintext). y Security - It means that it will keep the information hidden from all but those persons intended to see it despite the attempts of others to crack the system.
user. y Individuals can post their public key on their Web site.
Disadvantages
y The complexity of the algorithm. y Calculating the ciphertext from plaintext using the long
keys takes a lot of time. y Disadvantage of public key systems is that there is a problem of key validation. y Encryption Does Not Protect Against a Malicious DBA.
Conclusion
y The primary objective of this system is to protect confidential documents. y Cryptography helps to store confidential data of any size. y DES, Triple DES, Blowfish and XOR algorithms are fast and are well suited
for performing cryptographic transformations on large streams of data. y It is a very easy process of securing important data. y Scope of the project is not only to meet the needs of an organisation but also on individual needs. y The proposed system achieves the following goals: Confidentiality Data integrity Authentication
References
y Applied Cryptography by Bruce Schneier y Handbook of Applied Cryptography by A.J.Menezes and
Thank you