Modern Encryption Lecture Notes PDF

Summary

These lecture notes provide an overview of modern encryption techniques. Topics covered include different types of encryption, data formats, and various algorithms such as block ciphers and stream ciphers. The notes also summarize the differences between symmetric and asymmetric encryption methods.

Full Transcript

Outlines  Why Modern Encryption?  Types of Encryption.  Data Types and it’s formats.  Symmetric Encryption.  Block Cipher.  Block Cipher Modes of Operation.  Types of Block Cipher.  Stream Cipher.  Block Ciphers vs. Stream Ciphers.  Asymmetric Encryption. Outlines contents  Public Key....

Outlines  Why Modern Encryption?  Types of Encryption.  Data Types and it’s formats.  Symmetric Encryption.  Block Cipher.  Block Cipher Modes of Operation.  Types of Block Cipher.  Stream Cipher.  Block Ciphers vs. Stream Ciphers.  Asymmetric Encryption. Outlines contents  Public Key.  Types of Asymmetric Cipher.  Message Authentication.  Digital Signatures.  Summary Why Modern Encryption? Data Privacy Integrity Digital Authentication Signatures Types of Encryption Encryption Modern Classical Asymmetric key Symmetric key Vigenère Caesar Public key Private key Block cipher Stream cipher Data Types and it’s formats.doc.rtf Text.pdf Progra m Langua ge Data Types and it’s formats Cont.’s.png.tif Image.jpg.gif Data Types and it’s formats Cont.’s.mp3.wm a Voice.wav.ra Data Types and it’s formats Cont.’s.mp4.wm v Video.avi.flv Symmetric Encryption Types of Symmetric Encryption Block Stream cipher cipher DES RC4 Blowfish A5 Block cipher Modes of Operation of Block Cipher Electronic Codebook Mode. Cipher Block Chaining Mode Propagating cipher- block chaining. Types of Block Cipher. Block Cipher DES Blowfish AES Data Encryption Standard(DES) Data Encryption Standard(DES) Blowfish Stream cipher Block Ciphers vs. Stream Ciphers. Block Cipher Stream Cipher Block ciphers can be Stream ciphers that only easier to implement in encrypt and decrypt data software. one bit at a time are not really suitable for software implementation. Not suitable for hardware stream ciphers can be implementation. more suitable for hardware implementation. Used key one time. Used key more time Asymmetric Encryption Public Key. Types of Asymmetric Cipher. RS A Diffie- Asymmetric Elliptic Hellma n Cipher Curve El- Gama l Message Authentication Message Encryption Hash function Digital Signature Summary ITEMS Symmetric Cipher Asymmetric Cipher Keys One key is shared between two or One entity has a public key and the more entities. other entity has a private key. Speed Algorithm is less complex and Algorithm is more complex and faster. slower. Key length Fixed-key length. Variable-key length. Use Bulk encryption, which means Key encryption and distributing encrypting files and communication keys. paths Security Confidentiality and integrity. Confidentiality, integrity, service authentication, and non repudiation. provided

Use Quizgecko on...
Browser
Browser