SlideShare a Scribd company logo
1 of 16
Cryptography Made Easy
Mr. Abhijeet A. More
(Perfect Training Center)
Why Study Cryptography?
• Secrets are intrinsically interesting
• So much real-life drama:
– Mary Queen of Scots executed for treason
– primary evidence was an encoded letter
– they tricked the conspirators with a
forgery
• Students enjoy puzzles
• Real world application of mathematics
Some basic terminology
• Alice wants to send a secret message to Bob
• Eve is eavesdropping
• Cryptographers tell Alice and Bob how to
encode their messages
• Cryptanalysts help Eve to break the code
• Historic battle between the cryptographers
and the cryptanalysts that continues today
Start with an Algorithm
• The Spartans used a scytale in the
fifth century BC (transposition cipher)
• Card trick
• Caesar cipher (substitution cipher):
ABCDEFGHIJKLMNOPQRSTUVWXYZ
GHIJKLMNOPQRSTUVWXYZABCDEF
Then add a secret key
• Both parties know that the secret
word is "victory":
ABCDEFGHIJKLMNOPQRSTUVWXYZ
VICTORYABDEFGHJKLMNPQSUWXZ
• "state of the art" for hundreds of
years
• Gave birth to cryptanalysis first in the
Muslim world, later in Europe
Cryptographers v/s Cryptanalysts
• A battle that continues today
• Cryptographers try to devise more
clever algorithms and keys
• Cryptanalysts search for vulnerabilities
• Early cryptanalysts were linguists:
– frequency analysis
– properties of letters
Vigenère Square (polyalphabetic)
Vigenère Cipher
• More secure than
simple substitution
• Confederate cipher
disk shown (replica)
• Based on a secret
keyword or phrase
• Broken by Charles
Babbage
Cipher Machines: Enigma
• Germans thought it was
unbreakable
• Highly complex
– plug board to swap
arbitrary letters
– multiple scrambler disks
– reflector for symmetry
• Broken by the British in
WW II (Alan Turing)
Public Key Encryption
• Proposed by Diffie, Hellman, Merkle
• First big idea: use a function that cannot be
reversed (a humpty dumpty function):
Alice tells Bob a function to apply using a
public key, and Eve can’t compute the
inverse
• Second big idea: use asymmetric keys
(sender and receiver use different keys):
Alice has a private key to compute the
inverse
• Key benefit: doesn't require the sharing of
a secret key
RSA Encryption
• Named for Ron Rivest, Adi Shamir, and
Leonard Adleman
• Invented in 1977, still the premier approach
• Based on Fermat's Little Theorem:
ap-11 (mod p) for prime p, gcd(a, p) = 1
• Slight variation:
a(p-1)(q-1)1 (mod pq) for distinct primes p
and q, gcd(a,pq) = 1
• Requires large primes (100+ digit primes)
Example of RSA
• Pick two primes p and q, compute n = pq
• Pick two numbers e and d, such that:
ed = k(p-1)(q-1) + 1 (for some k)
• Publish n and e (public key), encode with:
(original message)e mod n
• Keep d, p and q secret (private key), decode
with:
(encoded message)d mod n
Politics of Cryptography
• British actually discovered RSA first
but kept it secret
• Phil Zimmerman tried to bring
cryptography to the masses with PGP
and ended up being investigated as
an arms dealer by the FBI and a
grand jury
• The NSA hires more mathematicians
than any other organization
Card Trick Solution
• Given 5 cards, at least 2 will be of the same
suit (pigeon hole principle)
• Pick 2 such cards: one will be hidden, the
other will be the first card
• First card tells you the suit
• Hide the card that has a rank that is no more
than 6 higher than the other (using modular
wrap-around of king to ace)
• Arrange other cards to encode 1 through 6
Encoding 1 through 6
• Figure out the low, middle, and high cards
– rank (ace < 2 < 3 ... < 10 < jack < queen < king)
– if ranks are the same, use the name of the suit
(clubs < diamonds < hearts < spades)
• Some rule for the 6 arrangements, as in:
1: low/mid/hi 3: mid/low/hi 5: hi/low/mid
2: low/hi/mid 4: mid/hi/low 6: hi/mid/low
Questions?
Those who have any Query Contact me on my
Whats App No : 9766677504(only message)
16

More Related Content

Similar to Cryptography make easy

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquessaqib1611
 
cryptography and encryption and decryption
cryptography and encryption and decryptioncryptography and encryption and decryption
cryptography and encryption and decryptionNirajKumar620142
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutannewbie2019
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)Sam Bowne
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshopManojit Ballav
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificateDeepak Kumar (D3)
 
Ch08-CryptoConcepts.ppt
Ch08-CryptoConcepts.pptCh08-CryptoConcepts.ppt
Ch08-CryptoConcepts.pptShounakDas16
 

Similar to Cryptography make easy (20)

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Code and cipher
Code and cipherCode and cipher
Code and cipher
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
cryptography and encryption and decryption
cryptography and encryption and decryptioncryptography and encryption and decryption
cryptography and encryption and decryption
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Class 17
Class 17Class 17
Class 17
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
 
Encryption basics
Encryption basicsEncryption basics
Encryption basics
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Ch08-CryptoConcepts.ppt
Ch08-CryptoConcepts.pptCh08-CryptoConcepts.ppt
Ch08-CryptoConcepts.ppt
 

More from Perfect Training Center (8)

Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Career option for BCA Student
Career option for BCA StudentCareer option for BCA Student
Career option for BCA Student
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Stegnography
StegnographyStegnography
Stegnography
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Cryptography make easy

  • 1. Cryptography Made Easy Mr. Abhijeet A. More (Perfect Training Center)
  • 2. Why Study Cryptography? • Secrets are intrinsically interesting • So much real-life drama: – Mary Queen of Scots executed for treason – primary evidence was an encoded letter – they tricked the conspirators with a forgery • Students enjoy puzzles • Real world application of mathematics
  • 3. Some basic terminology • Alice wants to send a secret message to Bob • Eve is eavesdropping • Cryptographers tell Alice and Bob how to encode their messages • Cryptanalysts help Eve to break the code • Historic battle between the cryptographers and the cryptanalysts that continues today
  • 4. Start with an Algorithm • The Spartans used a scytale in the fifth century BC (transposition cipher) • Card trick • Caesar cipher (substitution cipher): ABCDEFGHIJKLMNOPQRSTUVWXYZ GHIJKLMNOPQRSTUVWXYZABCDEF
  • 5. Then add a secret key • Both parties know that the secret word is "victory": ABCDEFGHIJKLMNOPQRSTUVWXYZ VICTORYABDEFGHJKLMNPQSUWXZ • "state of the art" for hundreds of years • Gave birth to cryptanalysis first in the Muslim world, later in Europe
  • 6. Cryptographers v/s Cryptanalysts • A battle that continues today • Cryptographers try to devise more clever algorithms and keys • Cryptanalysts search for vulnerabilities • Early cryptanalysts were linguists: – frequency analysis – properties of letters
  • 8. Vigenère Cipher • More secure than simple substitution • Confederate cipher disk shown (replica) • Based on a secret keyword or phrase • Broken by Charles Babbage
  • 9. Cipher Machines: Enigma • Germans thought it was unbreakable • Highly complex – plug board to swap arbitrary letters – multiple scrambler disks – reflector for symmetry • Broken by the British in WW II (Alan Turing)
  • 10. Public Key Encryption • Proposed by Diffie, Hellman, Merkle • First big idea: use a function that cannot be reversed (a humpty dumpty function): Alice tells Bob a function to apply using a public key, and Eve can’t compute the inverse • Second big idea: use asymmetric keys (sender and receiver use different keys): Alice has a private key to compute the inverse • Key benefit: doesn't require the sharing of a secret key
  • 11. RSA Encryption • Named for Ron Rivest, Adi Shamir, and Leonard Adleman • Invented in 1977, still the premier approach • Based on Fermat's Little Theorem: ap-11 (mod p) for prime p, gcd(a, p) = 1 • Slight variation: a(p-1)(q-1)1 (mod pq) for distinct primes p and q, gcd(a,pq) = 1 • Requires large primes (100+ digit primes)
  • 12. Example of RSA • Pick two primes p and q, compute n = pq • Pick two numbers e and d, such that: ed = k(p-1)(q-1) + 1 (for some k) • Publish n and e (public key), encode with: (original message)e mod n • Keep d, p and q secret (private key), decode with: (encoded message)d mod n
  • 13. Politics of Cryptography • British actually discovered RSA first but kept it secret • Phil Zimmerman tried to bring cryptography to the masses with PGP and ended up being investigated as an arms dealer by the FBI and a grand jury • The NSA hires more mathematicians than any other organization
  • 14. Card Trick Solution • Given 5 cards, at least 2 will be of the same suit (pigeon hole principle) • Pick 2 such cards: one will be hidden, the other will be the first card • First card tells you the suit • Hide the card that has a rank that is no more than 6 higher than the other (using modular wrap-around of king to ace) • Arrange other cards to encode 1 through 6
  • 15. Encoding 1 through 6 • Figure out the low, middle, and high cards – rank (ace < 2 < 3 ... < 10 < jack < queen < king) – if ranks are the same, use the name of the suit (clubs < diamonds < hearts < spades) • Some rule for the 6 arrangements, as in: 1: low/mid/hi 3: mid/low/hi 5: hi/low/mid 2: low/hi/mid 4: mid/hi/low 6: hi/mid/low
  • 16. Questions? Those who have any Query Contact me on my Whats App No : 9766677504(only message) 16