Premium Essay

Importance Of Cryptography

Submitted By
Words 10253
Pages 42
CHAPTER 1
INTRODUCTION
1.1 CRYPTOGRAPHY
In-order to get security aspects ranging from commerce and payments to the private and public communications there are number of methods proposed till now. Among them cryptography is an important aspect for securing communications in transmitting, receiving and for storage electronic data. But it is necessary to know the method of securing data transmission by Cryptographic technique.
1.2 THE PURPOSE OF CRYPTOGRAPHY
Cryptography is among one of the ancient arts of writing languages in secret code. In 1900 B.C an Egyptian scribe was the first document used inscription for cryptography. Some of the experts argued that cryptography writing has appeared simultaneously after the writing has been invented, …show more content…
In this method the sender uses a key with some enhanced rules and regulations to encrypt the simple text (plain text) into cipher text that need to send to receiver. The receiver also applies the same enhanced rules to decrypt the cipher text in-order to get the Original content of the message. Actually a single key employs for both process, so it is called as symmetric key cryptography. Figure 1.1 Specific Key Cryptography
Secret key cryptography contains continuous ciphers (stream ciphers) or complex ciphers (block ciphers). Continuous ciphers (stream ciphers) are applied on a single bit (computer word or byte) at a time, so that the key constantly in changing form due to some form of observation (feedback) mechanism employed. The block cipher also employed by same nature but it applies on 1 block of information (data) at the same time by using the similar key on each of the block. In stream cipher plain text will be encrypted to different cipher text but in block cipher plain text block is always encrypted to same cipher data block.
1.3.1.1 Classification of Private Key Cryptography
There are two classes of private-key cryptography scheme which are commonly distinguished as block ciphers and stream …show more content…
Each of these operators can be transformed into individual blocks when constructing the circuit for computing the multiplicative inverse. From this simplified equation, the multiplicative inverse circuit 〖GF(2〗^8) can be produced as shown in Figure. Fig 3.3 Multiplicative Inversion of S-box
The legends for the blocks within the multiplicative inversion module from above are shown in the below figure.

Legends for the building blocks of Multiplicative inversion module
3.4 ISOMORPHIC MAPPING AND INVERSE ISOMORPHIC MAPPING
The multiplicative inverse computation will be done by decomposing the more complex 〖GF(2〗^8) to lower order fields of 〖GF(2〗^1), 〖GF(2〗^2) and 〖GF((2〗^2 )^2) . In order to accomplish the above, the following irreducible polynomials are used.

〖 GF(2〗^2) ► GF(2) : x2 + x + 1
〖 GF((2〗^2 )^2) ► 〖GF(2〗^2) : x2 + x + φ
〖 GF((2〗^2 )^2 )^2) ►〖 GF((2〗^2 )^2) : x2 + x + λ
Where φ = 〖{10}〗_2 and λ

Similar Documents

Free Essay

Cryptography Outline

...Course Title: Cryptography Section 1-1 Topic: Introduction To Cryptography Confidentiality, Integrity, Availability and Authentication How companies use cryptography How penetration testers can also use cryptography Tools, Techniques and Attacks Academics discusses history of encryption. Academics simply encrypt or hash, why aren't people using hashing more? Professional is just, encrypt or not, hash or just verify Section 1-2 Topic: Key Concepts of Cryptography: PKIS & Encryption Learning Objectives: Cryptography is one of the most underrated courses of study in the industry. Of those who do study it, issues with comprehension tend to hinder individual mastery. By taking this course, learners will finally be able to grasp all the critical concepts, theories and practices associated with Cryptography. This Cryptography presentation discusses and demonstrates the key concepts of Cryptography from attacks, PKIs and Encryption in detail. You’ll learn about the difference between public and private keys and about the similarities and differences between symmetry & asymmetry. We’ll also discuss the concept of integrity and confidentiality and their relationships to/with protocols. This Cryptography course will help you master the basics of Cryptography as you begin to develop the discipline needed to become an accomplished pen tester. Keys and Principles 1. Keys 1a. Symmetric - also referred to as same keys, private key, symmetric key - same (confidentially) ...

Words: 3749 - Pages: 15

Premium Essay

Encryption in Today's Information Systems

...behind it. To do this, one must comprehend the current encryption standards, the trends and developments in encryption technology, the importance of securing data, the government’s regulations pertaining to encryption, the companies involved in research and implementation, the implications of leaked or stolen data, and a brief look into the recent Heartbleed vulnerability. Encryption is at the heart of security in today’s networked world. When using the Internet, users are not always clicking around and taking in information passively, such as reading through their Facebook feed, a blog, or a news article. Often times, they are transmitting their own information while shopping online or registering for a website such as Twitter (Tyson 2014). Users take for granted the “behind the scenes” process of safeguarding the information they share while performing these day to day tasks. Simply put, encryption refers to any process used to make data more secure and less likely to be viewed or read by unauthorized or unintended parties (Tom’s Guide 2014). Encryption relies on the science of cryptography, which humans have used for thousands of years. Before the dawn of the information age, the majority of those who used cryptography were governments; particularity for their militaries. The Greek historian Plutarch recorded the use of simple cryptography by Spartan generals. The general and admirals would use a thin, wooden cylinder, called a scytale, to send...

Words: 767 - Pages: 4

Premium Essay

Advantages Of Elliptic Curve Cryptography

...Elliptic curve cryptography is a public key cryptographic method. It is a cryptographic method based on elliptic curves over finite fields. The elliptic curves defined over finite fields are used in elliptic curve cryptography since a practical digital system can handle only finite number of values. In finite fields the binary extensions fields are ideal, because of the ease with which they can be implemented in a digital system in comparison with other finite fields. The main advantage of elliptic curve cryptography is that it offers higher security with smaller key size in comparison with other existing schemes like RSA etc. Elliptic curve cryptography because of its small key size has smaller latency and lesser computational/hardware complexities...

Words: 1082 - Pages: 5

Premium Essay

Nt1310 Unit 3 Level Of Network Security

...because of IoT device’s specialty like a low power consumption, low computing power and so on. This section deducts security requirements of IoT devices. A. Lightweight Protocol and Cryptography Considering IoT device’s specialty, lightweight Protocol research like a CoAP, MQTT and lightweight cryptography research like a PRESENT, PRINCE, Kecak have actively done but verification of security strength is ongoing. Protocol and cryptography need to be selected by considering device and data’s importance, capability, power consumption and trade-off of these factors. B. Communication Security IoT devices use short distance communication (NFC, ZigBee, and Bluetooth), wireless communication (Wi-Fi, 3G, and LTE) and wired communication (ADSL, Optical). So security requirements are there for each communication technologies. And if devices use multiple communication technologies, additional security requirements are needed. Each communication technology should support integrity, availability, confidentiality and other security factors like authentication, permission, charging. C. Data Protection Data of IoT devices can include user’s private information (physical information, location, behavior pattern), so when data sent to other devices or cloud, confidentiality should grantee by using cryptography. D. Physical Protection IoT devices are closely located, so physical access is easy and security risk of devices is also increased. Root authority capturing attacks through external...

Words: 1279 - Pages: 6

Premium Essay

Cyber Law

...Unit-4 (ICS -305) Information security Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Standards that are available to assist organizations implement the appropriate programs and controls to mitigate these risks are for example BS7799/ISO 17799, Information Technology Infrastructure Library and COBIT.  Information security management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing these risks. Security Challenges  The risks to these assets can be calculated by analysis of the following issues:  Threats to your assets. These are unwanted events that could cause the intentional or accidental loss, damage or misuse of the assets  Vulnerabilities. How vulnerable (prone or weak) your assets are to attack  Impact. The magnitude of the potential loss or the seriousness of the event. Security services Information Security Governance, Information Security Governance or ISG, is a subset discipline of Corporate Governance focused on information Security systems and their performance and risk management.  Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations  Develop the information security strategy in support of business strategy and...

Words: 1808 - Pages: 8

Premium Essay

Crypotogohy

...“PALLADIUM CRYPTOGRAPHY” 1: ABSTRACT As we tend towards a more and more computer centric world, the concept of data security has attained a paramount importance. Though present day security systems offer a good level of protection, they are incapable of providing a “trust worthy” environment and are vulnerable to unexpected attacks. Palladium is a content protection concept that has spawned from the belief that the pc, as it currently stands, is not architecturally equipped to protect a user forms the pitfalls and challenges that an all-pervasive network such as the Internet poses. As a drastic change in pc hardware is not feasible largely due to economic reasons, palladium hopes to introduce a minimal change in this front. A paradigm shift is awaited in this scenario with the advent of usage of palladium, thus making content protection a shared concern of both software and hardware. In the course of this paper the revolutionary aspects of palladium are discussed in detail. 2: INTRODUCTION Cryptography is the method in which a message or file, called plain text, is taken and encrypted into cipher text in such a way that only authorized people know how to convert it back to plain text. This is done commonly in four ways: Secret key cryptography, public key cryptography, one way function cryptography and digital signatures. Unless the encryption technique used is very complex it is possible, with some effort, for crackers to decrypt files. Palladium is the code name...

Words: 1940 - Pages: 8

Premium Essay

On the Development of Comprehensive Information Security Policies for Organizations

...is from the International Journal of Academic Research; the authors are Fahad T. Bin Muhaya, Fazl-e-Hadi, and Abid Ali Minhas. The article offers guidelines on the development of information security policies for organizations based on a proposed framework. The introduction of the article emphases the importance of protecting information, “Information security failures have gradually damage many progressing organizations; ruining its repute, reducing customer trust and ultimately lose its market share.” I believe is this a very strong introductory statement. The introduction of the article also implies that a new form of terroristic attacks may come from breaching organizations and accessing sensitive information. The authors further suggest that information security comprises of three elements which are human, organizational, and technological vulnerabilities. The article objective is clearly stated as a tool on how to develop or improve information security. The development approach when viewing an organizational structure is defined in the article as threats versus defense. The article identifies security policy issues at the environment, application, cryptography, network, and physical layers. This is a simple definition but I feel that viewing a problem in its most basic form is the first step to developing a resolution. The authors’ issues in threats verses defense at the environmental layer are awareness, readiness, training, and attitude. The threat of awareness...

Words: 565 - Pages: 3

Premium Essay

Cryptography

...secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered in this chapter only describe the first of many steps necessary for better security in any number of situations. This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. I would like to say at the outset that this paper is very focused on terms, concepts, and schemes in current use and is not a treatise of the whole field. No mention is made here about pre-computerized crypto schemes, the difference between a substitution and transposition cipher, cryptanalysis, or other history. Interested readers should check out some of the books in the references section below for detailed — and interesting! — background information. 2. THE PURPOSE OF CRYPTOGRAPHY Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian...

Words: 7926 - Pages: 32

Premium Essay

Week Four Individual Assignment

...Week Four Individual Assignment Kevin M. Gattas University of Phoenix IS Concepts Richard Bohn Purpose The importance of the OSI (open systems interconnection) model is for networks to communicate within the system. It is a system formed to allow a network administrator to perform trouble shooting in a way that is logical and step by step within the OSI model Scope The purpose of this essay is to break down the seven layers of the OSI model. The seven layer model defines a standard by which to computer share data over a network space starting with application layer. It will break each modeling section to lay out a more detailed explanation of how each layer is operated and how they all work together. Also, it will discuss which level this packet filtering routers and firewalls reside at, how packet filtering routers and firewalls protect the network and the concepts of cryptography. The seven layers of the OSI model are: 1. Physical layer 2. Data link layer 3. Network layer 4. Transport layer 5. Session layer 6. Presentation layer 7. Application layer Application Layer (Layer 7) The application layer is the most directly related to computer user because it is the top of the layer hierarchy. This layer provides several application services such as file transfer, resource allocation and whether the identification and verification of the computer is available. This layer is most familiar to us because it is what we commonly...

Words: 1254 - Pages: 6

Premium Essay

Business and Management

...Short Report [Name of the Writer] [Name of the Institution] Executive Summary Technology’s role cannot be avoided form the development of any business as today’s rapidly changing technological advancements have given leverage to businesses as well as made things easier to individuals or consumers. The businesses in the present age function in a systematic manner and with advanced technology. The most positive thing to know is that the Darcy’s has recognized the importance of Internet Technology and needs to incorporate latest communication technologies in order to manage effective communication with their partners and employees. The implementation of Skype will bring multiple business benefits to the company in terms of cost reduction, efficiency in performance, active customer management and significant improve in communication with partners. The Skype has some security concerns as security breach and information theft has also been a great concern of many businesses as organizations face security incidents that bring significant damage to any organization. It is important to understand that nature as well as design of internet communication tools is very complex where it becomes difficult to protect information from theft. It would not be wrong to say that Darcy’s has concerns about its information security as the company cannot afford any security breach. However, the latest version of Skype and concrete IT policies will protect the privacy and data of the company...

Words: 2106 - Pages: 9

Premium Essay

Electronic Voting System

...Evecek CS701 Dr. Chow Spring 2007 This project for the Masters of Engineering in Software Engineer degree by Hakan Evecek has been approved for the Department of Computer Science By _______________________________________________________ Dr. C. Edward Chow, Chair _______________________________________________________ Dr. Richard Weiner _______________________________________________________ Dr. Xiaobo Zhou Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold Crytosystem Web Services Architecture and Design 17 4. Online E-Voting Prototype System 22 4.1. E-Voting System Overview 22 4.1.1 User Login 23 4.1.2. Election Set-Up 24 4.1.3. Creating Ballots 25 4.1.4. Vote Format 26 4.2. Voting 27 4.2.1. Creating the Vote 27 4.3. Tally the Vote 28 5. PTC Web Services Efficiency Improvement 29 5.1 Pre-Computation...

Words: 7163 - Pages: 29

Premium Essay

Introduction to Computer Security

...Introduction to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security requirements information...

Words: 1194 - Pages: 5

Free Essay

Partial Encryption on Fly

...technology to build cost effective solution for small scale applications. Finally, the applicability of these methodologies for HDD security will be evaluated on a set of data files with different key sizes. KEYWORDS- INFORMATION SECURITY, INTEGRITY, CONFIDENTIALITY, AUTHENTICATION, ENCRYPTION. I. INTRODUCTION In today’s world information security is an important concern for every individual. People spend hundreds of dollars in protecting their data to stay in the competition, and any leakage of crucial data can result in unrecoverable loss. Information security is the most important form of security even before network security, as information stored securely can only be transmitted securely over a network, there by stating the importance of information security over network security. However, along with the convenience and easy access to information come risks. Among them are the risks that valuable information will be lost, stolen, changed, or misused. Disk encryption is a technology which protects information in the disk by converting it into unreadable form that cannot be deciphered easily...

Words: 2258 - Pages: 10

Free Essay

Intro to Cribbing Isomophs

...| An Introduction to Cribbing Isomophs, Gaussian Elimination and The Hidden Markov Model | | Abstract While looking into cryptography and the building blocks that make up ciphers and theory, a mix of time and effort has produced concrete methods of cryptanalysis to identify the temporal pattern recognitions and algorithms necessary to decrypt cipher-text back to its plaintext root. This paper will look at the process of cribbing isomorphs to reveal the plaintext message, Gaussian Elimination and the process of back substitution, and the Hidden Markov Model to view visible output to that which was once hidden. Table of Contents Introduction 2 Cribbing Isomorphs 3 The Hidden Markov Model 4 Gaussian Elimination 5 Conclusion 6 Introduction In any cryptanalysts toolbox, there are a number of methods at their dispense which can aid in the deciphering of crypto-text messages back into their native plaintext message. Since the dawn of man, ways have been invented to hide secret information in an attempt to keep secret an intent, hide a plan, cover up a bad deed or whisper softly over distances. Encryption has proven the means to get this data over a medium and ensure that the integrity of the message arrives intact. Many times this information is intercepted and then the deciphering process begins. By knowing a certain amount about a message, cryptanalysts are able to piece the remaining message together by using cribbing, algorithms and back substitution...

Words: 1482 - Pages: 6

Free Essay

Digital Forensics - Uganda’s Preparedness

...entertainment, and public utilities like electricity, the more we get exposed to security risks. These security risks include breach of confidentiality of communication and transactions, violation of personal privacy, crime and fraud, disruption of services, and distribution of inappropriate content, among others. The goal of digital security is to research into and develop mechanisms to address these security risks. In this paper we briefly survey some of the emerging issues in digital security. The literature shows that while some domains in digital security have remained unchanged over a long time, for example cryptography, new areas have emerged including steganography. Keywords – digital forensic techniques, volatitle data extraction, digital image forensics, malware investigations, email security, symmetric key cryptography, asymmetric key cryptography, public key cryptography. Introduction Forensic science is defined as the application of the sciences as it pertains to legal matters or problems (Gialamas, 2000). One of the branches/fields of forensic science, namely criminalistics, is the profession and scientific discipline oriented to the recognition, identification, individualization and evaluation of physical evidence by the application of natural science to law-science problems (Gialamas, 2000) [1]. Digital forensics is the process of identifying, preserving, analysing, and presenting evidence in a manner that is legally acceptable [2], [3], [4], [5]. Digital forensics...

Words: 7291 - Pages: 30