Course: Cryptography and Network Security
Code: CSN15403
Branch: B.Tech -5th Semester
Lecture – 1: Introduction and Overview
Faculty & Coordinator : Dr. J Sathish Kumar (JSK)
Department of Computer Science and Engineering
Motilal Nehru National Institute of Technology Allahabad,
Prayagraj-211004
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Lets Get Started !!!!
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
History and Overview of Cryptography
• The Concise Oxford English Dictionary defines cryptography as “the
art of writing or solving codes.”
• Cryptography: The Science of creating coded messages
• Cryptanalysis: The art of breaking coded messages
• Clear text/Plaintext: The original Message
• Cipher text: The encoded message
• Key: Input to the cryptographic algorithm
• “Cryptography: Practice of the enciphering and deciphering of
messages in secret code in order to render them unintelligible to all
but the intended receiver
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
History and Overview of Cryptography
• But cryptography nowadays encompasses much more than this: it
deals with
• mechanisms for ensuring integrity,
• techniques for exchanging secret keys,
• protocols for authenticating users,
• electronic auctions and elections,
• digital cash, and more.
• Modern cryptography involves the study of mathematical techniques
for securing digital information, systems, and distributed
computations against adversarial attacks.
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Early Cryptography
• 3500 BC: Sumerians: Cuneiform writings
Source: Internet Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Early Cryptography
• 1900 BC: Egypt: First known use of cryptography
Source: Internet Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Early Cryptography
• 500 – 600 BC: ATBASH
Cipher
• Used by Hebrew scribes –
Substitution cipher
(reversed alphabet)
Source: Internet Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Early Cryptography
• 486 BC: Greece
• σκυτάλη – skytale
Source: Internet Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Early Cryptography
• 60 – 50 BC: Julius Caesar –
substitution cipher – Shift
letters by X positions:
• E.g. X = 3: A -> D, B -> E, C ->
F,....
• Weakness?
• Frequency analysis (1000 AD)
Source: Internet Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Early Cryptography
• Mono-alphabetic substitution
• letters of the plain text alphabet are mapped on to unique letters
throughout the entire message text
• cipher can be trivially broken because
i. The language of the plain text is easily recognizable. (frequency distribution-
unigram statistics- next slide)
ii. There are only s= |A| keys (e.g. for Roman alphabet, only 25 keys – 1 to 25)
to search exhaustively
• Exhaustive key search is always possible <make it practically infeasible is the
goal>
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Medieval Cryptography
• 1587: Vigenère Cipher
• Polyalphabetic: one to many
relationship
• Example
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Medieval Cryptography
Vigenère Cipher
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• 1845: Morse Code –
• Representation by code signal
• States (on and off) composed
into 5 symbols
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• 1863: Friedrich Kasiski breaks Vigenere: –
• By examining repeated strings of characters in the cipher
text, which could indicate the length of the secret key.
• Find length of keyword
• Once the length of the secret key is known, the cipher
text is rewritten into a corresponding number of
columns, with a column for each letter of the key.
• Each column is then made up of plaintext that’s been
encrypted by one Caesar cipher.
• Use frequency analysis to solve these
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• 1918: ADFGVX Cipher – Used in the German army in WWI
Encrypt the plaintext "attack at 1200am"
using keywords 147 regiment and privacy
Cipher Text: "DXXV GDAD DAAX DVDX VFGV GFAD DVVD".
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• 1918: ADFGVX Cipher – Used in the German army in WWI
Decrypt the ciphertext "ADDDF DDAXF XAGGF DXXAX FGXFG G" which was
encrypted using keywords monkeys and zebras
By reading off each row we get the intermediate text
"GXFGAX XFDFDA FXDDDX GAAXDF GG".
The plaintext is then retrieved as
"the way is clear".
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• 1918: The Enigma – Arthur Scherbius
• Business: confidential docs
• No codebooks
• Rotors -> multi substitution
• Wireing changes as-youtype
• German forces in WWII
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography: The Enigma
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• 1949: Shannon: –
• Communication Theory of Secret
Systems
• Proved: One time pad
unbreakable
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Modern Cryptography
• The DES (Data Encryption Standard) algorithm is a symmetric-key block cipher created in the early
1970s by an IBM team and adopted by the National Institute of Standards and Technology (NIST).
• 1976: Diffie – Hellman Key Exchange
• Public Key Crypto –
• Key exchange problem –
• Asymmetric key algorithm – E.g: RSA, MIT, 1977
• The most common public-key algorithm is the RSA cryptosystem, named for its inventors (Rivest, Shamir, and
Adleman).
• Elliptic Curve Cryptography (ECC) was discovered in 1985 by Victor Miller (IBM) and Neil Koblitz
(University of Washington) as an alternative mechanism for implementing public-key
cryptography.
• MD5 - Ronald Rivest, founder of RSA Data Security and professor in MIT, 1991
• The Advanced Encryption Standard (AES) was published on November 26, 2001
• SHA-512-2001
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Join in Google Class ID
• Class Name and Code For Section C Students: • Purpose:
• CS5C - Cryptography and Network Security • Assignment Submissions
(CSN15403)
• PPTs and Materials
• Class Code for Joining: CNS5C-2025 for Section C Accessibility
• Class Name and Code For Section D Students: • Feedback
• CS5D - Cryptography and Network Security
(CSN15403)
• Class Code for Joining: CNS5D-2025 for Section D
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad
Assignment #0
•Watch Movie “The Imitation Game”
Prepared by Dr. J Sathish Kumar, CSED, MNNIT Allahabad