CYPTOGRAPHY AND It's APPLICATION

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

[Audio] Good morning everyone, We’re here to discuss the important topic of cryptography and its application in data encryption. We’ll be exploring standard and advanced encryption standards, symmetric and asymmetric encryption, cryptographic hash functions, and key management. Let's get started..

Page 2 (9s)

[Audio] Cryptography is the study of techniques for secure communication in the presence of third parties. It can be used to protect both digital and analog data - from emails and photos to phone calls and regular mail. In this presentation, we will explore some of the most popular data encryption standards and advanced encryption standards to secure data. We will also look at the project motivators, Dr. Manish K Gupta and Dr. Manoj Raut and their knowledge of discrete mathematics SC205. By the end of this, we will have a better understanding of the field of cryptography and the techniques used for data encryption. Let's begin!.

Page 3 (30s)

[Audio] Cryptography is a process of encoding data for security. It has become an important part of our lives from communication, trade, to voting. Data Encryption Standard (DES) is the most commonly used encryption used globally and is a modern form of cryptography. Our project team consists of experts in the field who possess extensive experience in cryptography and its related applications. Nitin Kanzariya, Kashyap Trivedi, Zeel Boghara, Kartik Baria, Het Shah, and Manoj Dhundhalva have united their expertise and skill to work on this project. They have worked to make sure the encryption process is highly secure and reliable. We trust our team to address any problems that arise..

Page 4 (31s)

[Audio] Cryptography is a valuable asset for defending and maintaining security and confidentiality in the digital sphere. It can convert ordinary text into incomprehensible ciphertext, rendering confidential information inaccessible to unauthorized individuals. Cryptography also allows us to make sure that data hasn't been modified while being conveyed or stored. Additionally, it can be used to verify the identity of the entities participating in a communication and to make sure that messages are coming from authentic sources. Cryptography encompasses different techniques, such as symmetric and asymmetric encryption, which utilise dissimilar keys for encryption and decryption..

Page 5 (1m 45s)

[Audio] Cryptography is a strong instrument that can assist in safeguarding data from harmful parties. By means of cryptographic hash functions, data is securely transformed into a fixed-size code, which makes it hard for the original details to be accessed or taken. Key administration is likewise very essential for the security of cryptographic systems, as encryption keys must be securely produced, shared, and kept. Much like any type of security, cryptographic systems ought to be consistently monitored and enhanced to make certain they are safeguarded against any potential strikes..

Page 6 (3m 5s)

[Audio] Cryptography is a powerful method to protect and conserve data. It can be divided into three categories: symmetric encryption, asymmetric encryption, and cryptographic hash functions. Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses different keys for encryption and decryption. Cryptographic hash functions convert data into codes of a fixed length. Finally, key management involves creating, sharing, and preserving encryption keys securely..

Page 7 (4m 28s)

[Audio] Symmetric cryptography is a cryptographic system whereby a shared secret key is used for both encryption and decryption. The encryption process involves the plaintext message being encrypted with the same secret key, producing ciphertext which is then sent to the receiver. Upon receiving the ciphertext, the same secret key is then used to decrypt the ciphertext, thus resulting in the original plaintext message. Algorithms which are commonly used for symmetric cryptography include Advanced Encryption Standard (AES) and Data Encryption Standard (DES)..

Page 8 (5m 49s)

[Audio] Cryptography is a valuable resource in the digital arena, with asymmetric cryptography being one of the most secure methods of data encryption. It requires a public and a private key; the public key is disclosed to the sender while the private key is kept secret. Plaintext is encrypted using the receiver's public key forming ciphertext, which is sent to the end user. The receiver has the capacity to decrypt the ciphertext using their private key, reverting it back to the plaintext. Asymmetric cryptography provides benefits such as secure key exchange and digital signatures and the predominant algorithm is RSA..

Page 9 (7m 5s)

[Audio] Cryptography is a security method utilizing mathematical algorithms to safeguard data. Two renowned encryption standards are AES and DES. AES, or Advanced Encryption Standard, needs a 256-bit key for encrypting and decrypting data. DES, or Data Encryption Standard, is an older standard typically secure when the key length is over 56 bits..

Page 10 (7m 9s)

[Audio] AES, also known as Advanced Encryption Standard, is a symmetric encryption algorithm selected by the National Institute of Standards and Technology in the USA to protect classified information. Compared to the Data Encryption Standard, it provides superior security and efficiency with a block size of 128 bits used for both encryption and decryption. AES implements a secret key for encrypting and decrypting information, making it a reliable choice for transmitting and storing data..

Page 11 (7m 43s)

[Audio] Cryptography is a method of protecting information by converting it into an incomprehensible form. DES is a symmetric encryption algorithm which was widely used prior to AES. It takes 64-bit data blocks and works with a 56-bit secret key. The encryption process involves 16 steps that include substitution, permutation and XOR operations. Every round uses a 48-bit cipher key and the ciphertext is 64-bit long, which makes DES a very secure encryption algorithm..

Page 12 (9m 5s)

[Audio] AES is an encryption algorithm widely used for secure data encryption in various industries. It consists of multiple components that make it a powerful encryption method. The technique employs substitution and permutation to encrypt data. Depending on the level of security required, AES can use cryptographic keys of 128, 192 or 256 bits. AES is secure, straightforward, and quick and is therefore the top pick for many business and governmental organizations..

Page 13 (9m 43s)

[Audio] AES is a symmetric encryption algorithm working on blocks of data. It utilizes a Substitution Permutation Network (SPN) structure for encryption and decryption of data. The number of rounds used in AES depends on the key size, thereby providing enhanced security, therefore being an ideal algorithm for data encryption..

Page 14 (10m 8s)

[Audio] Cryptography is a branch of mathematics and technology focused on encoding and decoding data. This slide will discuss how data encryption works, concentrating on AES encryption. AES stands for Advanced Encryption Standard. It involves a series of functions, e.g. sub bytes, shift rows, mix columns and add key, to encrypt 128 bits of data and a key into ciphertext. The number of rounds required for the encryption process differs depending on the key size - 128-bit, 192-bit and 256-bit keys requiring 10, 12 and 14 rounds respectively..

Page 15 (11m 23s)

[Audio] Cryptography is a way of securing data by encrypting it with code. Two popular encryptions are Data Encryption Standard (DES) and Advanced Encryption Standard (AES). The strength of the encryption increases with the length of the key and this also means more time for the software to encrypt the data. For example, in DES, each round of encryption requires an encryption function (E) with 128-bit plain text and a 128-bit key, which is the same for both encryption and decryption, and a decryption function (D). AES has longer rounds and requires the same functions. Properly understanding and implementing these functions is necessary to guarantee secure data and prevent breaches..

Page 16 (12m 33s)

[Audio] Cryptography is a crucial instrument to guarantee data security. The Advanced Encryption Standard (AES) is the most extensively applied encryption algorithm. It is employed by governments, corporations, and individuals alike. AES uses a 128-bit key to encrypt data. Thus, the key is strengthened into a 44-word schedule, plus 11 round keys, to guarantee the security of the data against unauthorized access. Encryption and decryption of data is done by employing the developed key..

Page 17 (13m 53s)

[Audio] Cryptography is a science that deals with transforming data into a secure format to protect it from malicious actors. One of the most used encryption methods is Data Encryption Standard (DES), which uses a 56-bit key made up of 8 parity-checked bits and 48 bits of data. Whereas Advanced Encryption Standard (AES) uses a variable-length key with a size of 128, 192, or 256 bits, where the number of round keys used is determined by the key size - 11 in the case of 128 bits. SubBytes is a process present in both DES and AES, which consists of substituting each element of the matrix with an element of the s-box matrix, which is a look-up table built using Galois fields and a generating function. Shift rows is another step, which consists of cylindrically shifting the block's rows to the left. The first row is left untouched, the second is shifted by one, the third by two, and the fourth by three..

Page 18 (14m 59s)

[Audio] Cryptography is the practice of taking plaintext data and transforming it using a cipher algorithm to make it unreadable except to those who possess a special key. Data encryption is the process of scrambling data to ensure it can only be decrypted with the correct key. AES (Advanced Encryption Standard) is the cipher currently used by the US Government to protect sensitive information. Mix columns is an important step of the AES algorithm which flips the bits of the entire block and multiplies it with a fixed matrix. This is done using field multiplication in Galois field to produce a four-byte output for each row which is then XOR'd with twelve other bytes..

Page 19 (16m 13s)

[Audio] Each byte in this stage of the data encryption process is XOR-ed with its corresponding element of the encryption key's matrix, thus guaranteeing that every encrypted output is distinctive as the same key is not used twice consecutively. To stop any weakening of the algorithm, the key is extended in each round. Lastly, the mix column step is omitted in the final round, despite the fact that it is unclear why this is done. Nevertheless, a paper was recently released against this method, voicing apprehensions that the cipher text could become weakened..

Page 20 (17m 35s)

[Audio] DES is a cryptographic algorithm that provides a secure way to safeguard data from unauthorized access. Simplicity and security are both priorities; it is easy to implement and use, yet incredibly robust. DES uses a 56-bit key for encryption and decryption, with 72 quadrillion possible keys – making it very difficult to break. This makes it an effective security tool for organizations who need to protect their sensitive information..

Page 21 (17m 42s)

[Audio] Cryptography is the practice of protecting data through encryption and algorithms. One encryption algorithm in particular, known as DES (Data Encryption Standard), is based on the Feistel Cipher which defines the round function, the key schedule, any extra processing, and the initial and final permutation. DES is the most commonly used algorithm for secure communication and is noted for its robustness..

Page 22 (18m 11s)

[Audio] Cryptography and its applications have significant consequences for data protection and security. The initial and final permutations in the Data Encryption Standard (DES) are crucial steps in encrypting data. These two Permutation boxes are the inverse of each other and rearrange the bits entering and exiting the DES algorithm. The initial and final permutations guarantee that each bit in a data block flows through all the stages of the DES process, starting at one end and ending up at the other..

Page 23 (19m 37s)

[Audio] Cryptography is an art of securing data by encrypting it, thus protecting it from any unauthorized access. This slide focuses on the round function used in the Data Encryption Standard (DES). This process makes use of a 48-bit key to process the rightmost 32 bits of the data in order to generate a 32-bit output. Subsequently, an Expansion Permutation Box is employed for expanding the right input from 32-bit to 48-bit. The DES then performs an Exclusive-or (XOR) operation on the expanded right section and the round key. Lastly, the S-boxes execute the mixing of the output. Each S-box has a 6-bit input and a 4-bit output, which are fundamental elements of the round function..

Page 24 (20m 42s)

[Audio] Cryptography is the science of protecting information by scrambling it in order to prevent unauthorized access. We have been discussing two particular types of cryptology - Data Encryption Standard and Advanced Encryption Standard. This slide is looking at the S-box rule which is a part of the Data Encryption Standard. It consists of 8 tables, and the output from these tables is combined into a 32 bit section which is then subjected to the Straight Permutation rule. This encoding method is essential in protecting important data from unauthorized access..

Page 25 (22m 2s)

[Audio] Cryptography refers to the practice and study of techniques for secure communication when there are third parties involved. An example of this is data encryption, which takes plain text data and converts it into encrypted data, or ciphertext, to be shared securely between different systems. Advanced Encryption Standard (AES) is a symmetric encryption algorithm that uses a single key for both encryption and decryption. Key generation is an important part of AES and involves generating sixteen 48-bit keys from a 56-bit cipher key. To make sure no two keys are the same, several techniques such as Parity drop, shifting, and Compression P-box are used. Thanks to AES, data remains secure and can be securely shared between different systems..

Page 26 (22m 56s)

[Audio] Cryptography is a technique of managing data security by making use of mathematical algorithms and coding. The two most applied data encryption standards are AES and DES, both of which make use of intricate mathematical and cryptographic concepts. The algorithms for cryptography incorporate modular arithmatic, Boolean algebra, Data Encryption Standard (DES) and Advanced Encryption Standard (AES). Finite fields are also taken into account to further protect data, thus making AES and DES two of the soundest and most potent data encryption algorithms available..

Page 27 (23m 56s)

[Audio] Cryptography is essential in data security and modular arithmetic is a significant part of it. Modular arithmetic is an arithmetic system where numbers are divided by a modulus, and just the remainder is included in the outcome. For example, when dividing 17 by 5, the result is 3 with a remainder of 2. In modular arithmetic, the result is the remainder, which in this situation is 2. This can be expressed as 17 ≡ 2 (mod 5). This kind of calculation can be used for developing data encryption standards and advanced encryption standards..

Page 28 (25m 13s)

[Audio] Cryptography is essential for secure communication and Boolean algebra is a foundational tool used for data encryption. It is a set of rules working with two binary variables, an "on" and an "off". The "AND" operation requires both inputs to be "on" for an output of "on", while the "OR" operation requires at least one input to be "on" to be "on". The "XOR" operation requires the two switches to have different states for the output to be "on". Utilizing these principles in cryptography is important for developing secure codes and data..

Page 29 (26m 32s)

[Audio] Cryptography is the practice and study of techniques to ensure secure communication even when third parties are present. DES and AES are the two most commonly used cryptographic algorithms. These algorithms involve strong mathematical concepts such as modular arithmetic, Boolean algebra and Galois Fields to guarantee the security and privacy of data..

Page 30 (26m 57s)

[Audio] Cryptography is a digital security technique employed to safeguard data from being accessed by unauthorized parties. It utilizes finite fields, which apply the principles of addition and multiplication within a limited set of numbers, as one of its most powerful tools. This process leverages the concept of wrapping around, in which a certain limit is hit and the process starts again from the outset. As an illustration, if the result of adding two numbers is an 'overflow', the number wraps around and resumes from the start of the finite field. This potent tool provides solid security for data, helping to keep it off-limits to unauthorized parties..

Page 31 (28m 12s)

[Audio] Cryptography provides an effective means of ensuring data security. Through the use of encryption algorithms such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES), confidential data can remain inaccessible to those without authorized access. These algorithms also help to prevent malicious modifications and tampering of encrypted data, while secure communication channels can be established across public networks, keeping sensitive information safe from potential external attacks. As a result, cryptography can offer peace of mind surrounding data security..

Page 32 (29m 31s)

[Audio] Cryptography is a complex and important subject with the application of data encryption being essential for many organizations. Two industry standards have been adopted to meet this purpose, Advanced Encryption Standard (AES) and Data Encryption Standard (DES). Compliance with security regulations and standards like PCI DSS and FIPS can be met by using these standards. DES, which is considered relatively weak by current standards, is still in use in some legacy systems. AES offers backward compatibility by having various key lengths, allowing organizations to gradually transition from DES to AES..

Page 33 (30m 46s)

[Audio] Cryptography is a technology that provides a secure means of communication by encoding messages to prevent unauthorized access. It uses two main algorithms, known as AES and DES, to encrypt messages into an unreadable form. To decrypt the message, the same algorithm and key must be used. These algorithms are also important in verifying that the message has not been tampered with during transmission, thus ensuring the integrity and confidentiality of data..