cryptography full report
#5
[attachment=11604]
ITNS and CERIAS CISSP Luncheon Series: Cryptography
Introduction
 “Hidden writing”
 Increasingly used to protect information
 Can ensure confidentiality
Integrity and Authenticity too
 History – The Manual Era
 Dates back to at least 2000 B.C.
 Pen and Paper Cryptography
 Examples
• Scytale
• Atbash
• Caesar
• Vigenère
History – The Mechanical Era
 Invention of cipher machines
 Examples
Confederate Army’s Cipher Disk
• Japanese Red and Purple Machines
• German Enigma
 History – The Modern Era
 Computers!
 Examples
• Lucifer
• Rijndael
• RSA
• ElGamal
Speak Like a Crypto Geek
Plaintext – A message in its natural format readable by an attacker
Ciphertext – Message altered to be unreadable by anyone except the intended recipients
Key – Sequence that controls the operation and behavior of the cryptographic algorithm
Keyspace – Total number of possible values of keys in a crypto algorithm
Speak Like a Crypto Geek (2)
Initialization Vector – Random values used with ciphers to ensure no patterns are created during encryption
Cryptosystem – The combination of algorithm, key, and key management functions used to perform cryptographic operations
 Cryptosystem Services
 Confidentiality
 Integrity
 Authenticity
 Nonrepudiation
 Access Control
 Types of Cryptography
 Stream-based Ciphers
 One at a time, please
 Mixes plaintext with key stream
 Good for real-time services
 Block Ciphers
 Amusement Park Ride
 Substitution and transposition
 Encryption Systems
 Substitution Cipher
 Convert one letter to another
 Cryptoquip
 Transposition Cipher
 Change position of letter in text
 Word Jumble
 Monoalphabetic Cipher
 Caesar
 Encryption Systems
 Polyalphabetic Cipher
 Vigenère
 Modular Mathematics
 Running Key Cipher
 One-time Pads
 Randomly generated keys
 Steganography
 Hiding a message within another medium, such as an image
 No key is required
 Example
 Modify color map of JPEG image
 Cryptographic Methods
 Symmetric
 Same key for encryption and decryption
 Key distribution problem
 Asymmetric
 Mathematically related key pairs for encryption and decryption
 Public and private keys
 Cryptographic Methods
 Hybrid
 Combines strengths of both methods
 Asymmetric distributes symmetric key
» Also known as a session key
 Symmetric provides bulk encryption
 Example:
» SSL negotiates a hybrid method
 Attributes of Strong Encryption
 Confusion
 Change key values each round
 Performed through substitution
 Complicates plaintext/key relationship
 Diffusion
 Change location of plaintext in ciphertext
 Done through transposition
 Symmetric Algorithms
 DES
 Modes: ECB, CBC, CFB, OFB, CM
 3DES
 AES
 IDEA
 Blowfish
 Symmetric Algorithms
 RC4
 RC5
 CAST
 SAFER
 Twofish
 Asymmetric Algorithms
 Diffie-Hellman
 RSA
 El Gamal
 Elliptic Curve Cryptography (ECC)
 Hashing Algorithms
 MD5
 Computes 128-bit hash value
 Widely used for file integrity checking
 SHA-1
 Computes 160-bit hash value
 NIST approved message digest algorithm
 Hashing Algorithms
 HAVAL
 Computes between 128 and 256 bit hash
 Between 3 and 5 rounds
 RIPEMD-160
 Developed in Europe published in 1996
 Patent-free
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: letters of, cryptography full report and ppt for cs, screwtape letters, mic preamp 358, interception, makeup geek, bonified certificates,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: cryptography full report - by project topics - 02-04-2010, 03:51 PM
RE: cryptography full report - by seminar class - 08-03-2011, 02:15 PM
RE: cryptography {ITNS and CERIAS CISSP Luncheon Series: Cryptography} - by seminar class - 02-04-2011, 04:25 PM
RE: cryptography full report - by seminar class - 05-04-2011, 09:37 AM
RE: cryptography full report - by seminar class - 30-04-2011, 10:02 AM
RE: cryptography full report - by seminar class - 30-04-2011, 03:54 PM
RE: cryptography full report - by seminar addict - 07-12-2011, 09:49 AM
RE: cryptography full report - by TILAHUN - 07-12-2011, 01:10 PM
RE: cryptography full report - by seminar addict - 08-12-2011, 09:49 AM
RE: cryptography full report - by laluprasad - 18-01-2012, 09:30 PM
RE: cryptography full report - by seminar addict - 19-01-2012, 11:04 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,880 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,794 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,954 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,669 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,040 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,130 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,473 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,608 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,349 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,428 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: