Você está na página 1de 18

CRYPTOGRAPHY

Submitted in partial fulfillment of the Requirements for the award of the degree of Bachelor of Technology In Computer Science & Engineering By:
GAGANDEEP SINGH (0651322708/CSE1/2008) GAGANDEEP KAUR(0661322708/CSE1/2008) ISHDEEP SINGH(00913207209/CSE1/2008)

Department of Computer Science & Engineering Guru Tegh Bahadur Institute of Technology Guru Gobind Singh Indraprastha University Dwarka,New Delhi

What is CRYPTOGRAPHY?
y Cryptography, a word with Greek origins,

means SECRET WRITING. y It is the science of writing messages in secret codes. y It is a process to encrypt sensitive information to protect your privacy.

Components of Cryptography
y PLAIN TEXT

It is original message ,before being transformed. The data are not encrypted. y CIPHER TEXT After the message is transformed . The data are encrypted. y Alice Alice is the person who needs to send secure data. y Bob Bob is the recipient of the data.

y Eve

Eve is the person who somehow disturbs the communication between Alice and Bob. y ENCRYPTION Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. y DECRYPTION It is the process of converting encrypted data back into its original form, so it can be understood.

Process of Cryptography

Types of Cryptography
y Symmetric key cryptography
In symmetric key cryptography, the same key is used by the sender(for Encryption) and the receiver(for Decryption) . The key used is called Public key.

y Asymmetric key cryptography


In asymmetric key cryptography, two types of keys are used. Different keys are used by both sender and receiver. The key used is called Private key.

MODES OF ENCRYPTION OR DECRYPTION


y Manual mode

In this mode user selects the algorithm for encryption or decryption. y Dynamic mode In this mode system itself selects the algorithm for encryption or decryption randomly.

ALGORITHMS USED FOR ENCRYPTION AND DECRYPTION


y DES: DATA ENCRYPTION STANDARDS DES encrypts and decrypts at the bit level. The plain text are broken into segments of 64 bits. Each section is encrypted using a 56-bit key. It is very difficult to guess the bits of plaintext from the bits of ciphertext. y BLOWFISH Blowfish has a 64-bit block size and a variable key length from 32 bits to 448. While doing key scheduling, it generates large pseudo-random lookup tables by doing several encryptions. It is not a good choice when a large memory space is not available.

y TES (Triple DES)


It is a variation of Data Encryption Standard (DES). It uses a 64-bit key consisting of 56 effective key bits and 8 parity bits. The size of the block for Triple-DES is 8 bytes. It improves the security of DES by applying DES encryption three times using three different keys. Triple DES algorithm is very secure, but it is also very slow.

y XOR XOR cipher is a simple encryption algorithm that operates according to the principles of XOR. With this logic, a string of text can be encrypted by applying the bitwise XOR operator to every character using a given key. To decrypt the output, merely reapplying the key will remove the cipher.

Message digest
y Message-Digest Algorithm is a widely used cryptographic

hash function that produces a 128-bit (16-byte) hash value. It has been employed in a wide variety of security applications, and is also commonly used to check data integrity. However, it has been shown that MD is not collision resistant, so it is not suitable for applications like digital signatures that rely on this property. An MD hash is typically expressed as a 32-digit hexadecimal number. y It was designed by Ron Rivest in 1991.

Applications Of Cryptography
y Privacy & Security : E-mail message, Wireless network
A company may have information that a competitor would like to see, such as information concerning legal or financial problems

y Confidentiality : Personal records, Transaction records


Companies often possess data files on employees which are confidential, such as medical records, salary records, etc. Employees will feel safer knowing that these files are encrypted and are not accessible to casual inspection. It also enables you to encrypt sensitive data, such as credit card numbers

y Authentication : Digital signatures, Login


It enable users to sign the electronic documents digitally and encrypt them which assures the user of data integrity, confidentiality, security and nonrepudiation of documents and transactions.

y Intellectual Property : Copy protection


It prevent the illegal copying or use of computer software and data. One method is the EXE wrapper which will take an EXE and create an encrypted version of the software. It can only be decrypted through the copy protection wrapper.

Advantages
y Ease-of-use - It is easy to understand. y Reliability- It means that when used as its designer

intended it to be used, will always reveal exactly the information hidden when it is needed (in other words, that the ciphertext will always be recoverable and the recovered data will be the same as to the original plaintext). y Security - It means that it will keep the information hidden from all but those persons intended to see it despite the attempts of others to crack the system.

y The number of the keys is only twice of the number of

user. y Individuals can post their public key on their Web site.

Disadvantages
y The complexity of the algorithm. y Calculating the ciphertext from plaintext using the long

keys takes a lot of time. y Disadvantage of public key systems is that there is a problem of key validation. y Encryption Does Not Protect Against a Malicious DBA.

Conclusion
y The primary objective of this system is to protect confidential documents. y Cryptography helps to store confidential data of any size. y DES, Triple DES, Blowfish and XOR algorithms are fast and are well suited

for performing cryptographic transformations on large streams of data. y It is a very easy process of securing important data. y Scope of the project is not only to meet the needs of an organisation but also on individual needs. y The proposed system achieves the following goals: Confidentiality Data integrity Authentication

References
y Applied Cryptography by Bruce Schneier y Handbook of Applied Cryptography by A.J.Menezes and

P.C.Van Oorschot y Modern Cryptography by P.Rogaway y en.wikipedia.org/wiki/cryptography y cryptocode.wordpress.com/

Thank you

Você também pode gostar