Lecture 04
Cryptography
C O U R S E I N S T R U C T O R : M A M K I S H WA R
L E C T U R E R : D E PA R T M E N T O F I T & C S
I S L A M I A U N I V E R S I T Y B A H A WA L P U R
M S I N F O R M AT I O N T E C H N O L O G Y
Cryptography
Cryptography is a technique in which plain text is
converted into cipher text and cipher text is
converted into plain text.
Plain text(Readable text)
Cipher text(Unreadable text)
Cryptography is the science of secret writing.
We use cryptography to achieve confidentiality.
It protects the information from unauthorized person.
It secure communication in the presence of third
parties.
Cryptography gives the means to construct a secure
logical channel over an insecure physical connection.
Types of Cryptography
1) Symmetric key Cryptography
2) Asymmetric key Cryptography
3) Hashing
o Key is the string of bits used by cryptographic
algorithm to transfer plain text into cipher
text.
o Keys can be same or different while
performing encryption and decryption.
o Same keys=Symmetric key
o Different key=Asymmetric key
Symmetric Key
The type of cryptography involves the use of single
key to encrypt and decrypt data.
Both the sender and receiver use the same keys
which must be kept secret to maintain security.
It is also called private key or secrete key
cryptography.
As same key is used for encryption and decryption
less complexity occur in symmetric key cryptography.
It is faster because complexity is low.
Utilize less recourses so less secure.
Transmit bulk of data.
Symmetric Encryption
Single-key encryption
Components of Symmetric Key
1. Plain Text
2. Cipher Text
3. Encryption Algorithm
4. Decryption Algorithm
5. Encryption
6. Decryption
7. Private Key
Asymmetric Key
Asymmetric key is also called public key
cryptography.
Uses a the pair of key a public key and a private key
to encrypt and decrypt data.
The public key is available to anyone, while private
key is kept secret by the owner.
As different key is used for encryption and
decryption more complexity occur in Asymmetric key
cryptography.
It is slower because complexity is high.
Utilize more recourses so more secure.
Transmit small blocks of data.
Components of Asymmetric Key
1. Plain Text
2. Cipher Text
3. Encryption Algorithm
4. Decryption Algorithm
5. Encryption
6. Decryption
7. Private Key
8. Public Key
Key points in Cryptograpy
o Encryption
o Decryption
o Digital Signature
o Key Exchange
o SSL/TLS
Key points in Cryptograpy
Encryption: The process of transferring information
from readable to unreadable format.
Decryption: The process of transferring information
from unreadable to readable format.
Digital signature: The receiver uses the sender public
key to prove that message is indeed signed by sender.
Key Exchange: The process in which two parties
securely exchange keys.
o Symmetric key exchange: Both parties share the same
secrete key.
o Asymmetric key exchange: parties exchange public
keys, then use private keys for decryption.
TLS/SSL
TLS/SSL: TLS(Transport Layer Security)
and SSL(Secure Sockets Layer) are
cryptographic protocols that provides
secure communication over the internet.
o Both TLS & SSL operates on the transport
layer (layer 4) of OSI model providing end
to end encryption and security for data
transmitted over internet.
o SSL & TLS secure data transmission
between client and server.