SlideShare a Scribd company logo
1 of 16
Cryptography Made Easy
Mr. Abhijeet A. More
(Perfect Training Center)
Why Study Cryptography?
• Secrets are intrinsically interesting
• So much real-life drama:
– Mary Queen of Scots executed for treason
– primary evidence was an encoded letter
– they tricked the conspirators with a
forgery
• Students enjoy puzzles
• Real world application of mathematics
Some basic terminology
• Alice wants to send a secret message to Bob
• Eve is eavesdropping
• Cryptographers tell Alice and Bob how to
encode their messages
• Cryptanalysts help Eve to break the code
• Historic battle between the cryptographers
and the cryptanalysts that continues today
Start with an Algorithm
• The Spartans used a scytale in the
fifth century BC (transposition cipher)
• Card trick
• Caesar cipher (substitution cipher):
ABCDEFGHIJKLMNOPQRSTUVWXYZ
GHIJKLMNOPQRSTUVWXYZABCDEF
Then add a secret key
• Both parties know that the secret
word is "victory":
ABCDEFGHIJKLMNOPQRSTUVWXYZ
VICTORYABDEFGHJKLMNPQSUWXZ
• "state of the art" for hundreds of
years
• Gave birth to cryptanalysis first in the
Muslim world, later in Europe
Cryptographers v/s Cryptanalysts
• A battle that continues today
• Cryptographers try to devise more
clever algorithms and keys
• Cryptanalysts search for vulnerabilities
• Early cryptanalysts were linguists:
– frequency analysis
– properties of letters
Vigenère Square (polyalphabetic)
Vigenère Cipher
• More secure than
simple substitution
• Confederate cipher
disk shown (replica)
• Based on a secret
keyword or phrase
• Broken by Charles
Babbage
Cipher Machines: Enigma
• Germans thought it was
unbreakable
• Highly complex
– plug board to swap
arbitrary letters
– multiple scrambler disks
– reflector for symmetry
• Broken by the British in
WW II (Alan Turing)
Public Key Encryption
• Proposed by Diffie, Hellman, Merkle
• First big idea: use a function that cannot be
reversed (a humpty dumpty function):
Alice tells Bob a function to apply using a
public key, and Eve can’t compute the
inverse
• Second big idea: use asymmetric keys
(sender and receiver use different keys):
Alice has a private key to compute the
inverse
• Key benefit: doesn't require the sharing of
a secret key
RSA Encryption
• Named for Ron Rivest, Adi Shamir, and
Leonard Adleman
• Invented in 1977, still the premier approach
• Based on Fermat's Little Theorem:
ap-11 (mod p) for prime p, gcd(a, p) = 1
• Slight variation:
a(p-1)(q-1)1 (mod pq) for distinct primes p
and q, gcd(a,pq) = 1
• Requires large primes (100+ digit primes)
Example of RSA
• Pick two primes p and q, compute n = pq
• Pick two numbers e and d, such that:
ed = k(p-1)(q-1) + 1 (for some k)
• Publish n and e (public key), encode with:
(original message)e mod n
• Keep d, p and q secret (private key), decode
with:
(encoded message)d mod n
Politics of Cryptography
• British actually discovered RSA first
but kept it secret
• Phil Zimmerman tried to bring
cryptography to the masses with PGP
and ended up being investigated as
an arms dealer by the FBI and a
grand jury
• The NSA hires more mathematicians
than any other organization
Card Trick Solution
• Given 5 cards, at least 2 will be of the same
suit (pigeon hole principle)
• Pick 2 such cards: one will be hidden, the
other will be the first card
• First card tells you the suit
• Hide the card that has a rank that is no more
than 6 higher than the other (using modular
wrap-around of king to ace)
• Arrange other cards to encode 1 through 6
Encoding 1 through 6
• Figure out the low, middle, and high cards
– rank (ace < 2 < 3 ... < 10 < jack < queen < king)
– if ranks are the same, use the name of the suit
(clubs < diamonds < hearts < spades)
• Some rule for the 6 arrangements, as in:
1: low/mid/hi 3: mid/low/hi 5: hi/low/mid
2: low/hi/mid 4: mid/hi/low 6: hi/mid/low
Questions?
Those who have any Query Contact me on my
Whats App No : 9766677504(only message)
16

More Related Content

Similar to Cryptography make easy

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxRobertCarreonBula
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquessaqib1611
 
cryptography and encryption and decryption
cryptography and encryption and decryptioncryptography and encryption and decryption
cryptography and encryption and decryptionNirajKumar620142
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutannewbie2019
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)Sam Bowne
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshopManojit Ballav
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificateDeepak Kumar (D3)
 
Ch08-CryptoConcepts.ppt
Ch08-CryptoConcepts.pptCh08-CryptoConcepts.ppt
Ch08-CryptoConcepts.pptShounakDas16
 

Similar to Cryptography make easy (20)

Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Code and cipher
Code and cipherCode and cipher
Code and cipher
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Spring12_topic01.ppt
Spring12_topic01.pptSpring12_topic01.ppt
Spring12_topic01.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
cryptography and encryption and decryption
cryptography and encryption and decryptioncryptography and encryption and decryption
cryptography and encryption and decryption
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Class 17
Class 17Class 17
Class 17
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
 
Encryption basics
Encryption basicsEncryption basics
Encryption basics
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Ch08-CryptoConcepts.ppt
Ch08-CryptoConcepts.pptCh08-CryptoConcepts.ppt
Ch08-CryptoConcepts.ppt
 

More from Perfect Training Center (8)

Basics of networking and routing
Basics of networking and routingBasics of networking and routing
Basics of networking and routing
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Career option for BCA Student
Career option for BCA StudentCareer option for BCA Student
Career option for BCA Student
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Stegnography
StegnographyStegnography
Stegnography
 

Recently uploaded

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Recently uploaded (20)

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Cryptography make easy

  • 1. Cryptography Made Easy Mr. Abhijeet A. More (Perfect Training Center)
  • 2. Why Study Cryptography? • Secrets are intrinsically interesting • So much real-life drama: – Mary Queen of Scots executed for treason – primary evidence was an encoded letter – they tricked the conspirators with a forgery • Students enjoy puzzles • Real world application of mathematics
  • 3. Some basic terminology • Alice wants to send a secret message to Bob • Eve is eavesdropping • Cryptographers tell Alice and Bob how to encode their messages • Cryptanalysts help Eve to break the code • Historic battle between the cryptographers and the cryptanalysts that continues today
  • 4. Start with an Algorithm • The Spartans used a scytale in the fifth century BC (transposition cipher) • Card trick • Caesar cipher (substitution cipher): ABCDEFGHIJKLMNOPQRSTUVWXYZ GHIJKLMNOPQRSTUVWXYZABCDEF
  • 5. Then add a secret key • Both parties know that the secret word is "victory": ABCDEFGHIJKLMNOPQRSTUVWXYZ VICTORYABDEFGHJKLMNPQSUWXZ • "state of the art" for hundreds of years • Gave birth to cryptanalysis first in the Muslim world, later in Europe
  • 6. Cryptographers v/s Cryptanalysts • A battle that continues today • Cryptographers try to devise more clever algorithms and keys • Cryptanalysts search for vulnerabilities • Early cryptanalysts were linguists: – frequency analysis – properties of letters
  • 8. Vigenère Cipher • More secure than simple substitution • Confederate cipher disk shown (replica) • Based on a secret keyword or phrase • Broken by Charles Babbage
  • 9. Cipher Machines: Enigma • Germans thought it was unbreakable • Highly complex – plug board to swap arbitrary letters – multiple scrambler disks – reflector for symmetry • Broken by the British in WW II (Alan Turing)
  • 10. Public Key Encryption • Proposed by Diffie, Hellman, Merkle • First big idea: use a function that cannot be reversed (a humpty dumpty function): Alice tells Bob a function to apply using a public key, and Eve can’t compute the inverse • Second big idea: use asymmetric keys (sender and receiver use different keys): Alice has a private key to compute the inverse • Key benefit: doesn't require the sharing of a secret key
  • 11. RSA Encryption • Named for Ron Rivest, Adi Shamir, and Leonard Adleman • Invented in 1977, still the premier approach • Based on Fermat's Little Theorem: ap-11 (mod p) for prime p, gcd(a, p) = 1 • Slight variation: a(p-1)(q-1)1 (mod pq) for distinct primes p and q, gcd(a,pq) = 1 • Requires large primes (100+ digit primes)
  • 12. Example of RSA • Pick two primes p and q, compute n = pq • Pick two numbers e and d, such that: ed = k(p-1)(q-1) + 1 (for some k) • Publish n and e (public key), encode with: (original message)e mod n • Keep d, p and q secret (private key), decode with: (encoded message)d mod n
  • 13. Politics of Cryptography • British actually discovered RSA first but kept it secret • Phil Zimmerman tried to bring cryptography to the masses with PGP and ended up being investigated as an arms dealer by the FBI and a grand jury • The NSA hires more mathematicians than any other organization
  • 14. Card Trick Solution • Given 5 cards, at least 2 will be of the same suit (pigeon hole principle) • Pick 2 such cards: one will be hidden, the other will be the first card • First card tells you the suit • Hide the card that has a rank that is no more than 6 higher than the other (using modular wrap-around of king to ace) • Arrange other cards to encode 1 through 6
  • 15. Encoding 1 through 6 • Figure out the low, middle, and high cards – rank (ace < 2 < 3 ... < 10 < jack < queen < king) – if ranks are the same, use the name of the suit (clubs < diamonds < hearts < spades) • Some rule for the 6 arrangements, as in: 1: low/mid/hi 3: mid/low/hi 5: hi/low/mid 2: low/hi/mid 4: mid/hi/low 6: hi/mid/low
  • 16. Questions? Those who have any Query Contact me on my Whats App No : 9766677504(only message) 16