Cryptography - Georgia State University
Download
Report
Transcript Cryptography - Georgia State University
Cryptography
CSc 8320
Advanced Operating Systems
Barnali Chakrabarty
Overview
What is Cryptography ? Its history
And its fundamentals
Public and Private Cryptographic Systems
Current Work
Future Research
What is Cryptography ?
The process of converting intelligible information called the
plain text into something that is unintelligible, called the cipher text
History of Cryptography
2000 BC in Egypt
Atbash Cipher
Caesar Cipher
Fundamentals of Cryptography
Confidentiality
Authenticity
Integrity
Availability
Nonrepudiation
Public Key Cryptographic
Systems
asymmetric key algorithms
the key used to encrypt a message is not the
same as the key used to decrypt it
Diffie Hellman Algorithm: A public key
Cryptographic Algorithm
Private Key Cryptographic
Systems
- Also called Symmetric encryption
involves using the same key for
encryption and decryption.
One Time Pad: A Private Key
Cryptographic Algorithms
The plain text is combined with a secret
random key only once to produce the
cipher text
Current Work :Research on Elliptic
Curve Cryptography[Q.Qiu04]
Offer major advantages over Traditional
systems like
1.lesser storage
3.smaller keysize
4.increased speed
Future Work: Research on
Quantum Cryptography[5]
based on photon physics. A photon vibrates as it
travels through space. The angle
of vibration is known as polarization of the photon.
Using different polarizations, the sender can
transmit a unique symmetric key to receiver each
time she needs to send a message. Theoretically,the
eavesdropper has no chance to intercept this key
because of unique properties of quantum physics
References
[1]http://all.net/BOOKS/IP/cHAP2-1.HTML
[2]http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html
[3]http://en.kioskea.net/contents/crypto/cleprivee.php3
[4] Research on elliptic curve cryptography, Qizhi Qiu ,
Qianxing Xiong,2004
[5]http://www.uhisrc.com/FTB/Cryptography/FTBCryptograph
y.pdf
[6]Distributed Operating Systems and Algorithm Analysis,
Andy Chow & Theodore Johnson,1997
[7]Wikipedia