An Introduction to Cryptography

Outline

Digital Communication System

Cryptography - History

Goals

Why Is It Now Popular

Export Controls

Cryptography

Cryptography

Cryptography

Cryptanalysis

Cryptanalysis

Types of Cryptographic Systems

Types of Cryptographic Systems

Types of Cryptographic Systems

Public Algorithm

Public Key Cryptography

Public Key Cryptography

Public Key Cryptography

Key Management

Public Key Systems

Block Ciphers

Block Cipher

Block Ciphers Problems

Feistel Cipher

Feistel Cipher

Feistel Cipher

Feistel Cipher

Data Encryption Standard
DES 1977

DES

DES

DES

DES

DES

DES

DES

DES “Hardware”

AES

Other AES Candidates

Public Key Cryptography

RSA

RSA

RSA

RSA

Public Key Cryptography

El Gamal Cipher

El Gamal Cipher

Diffie-Hellman Key Exchange

Stream Ciphers

Key Generator

Authentication Signature Schemes

Signatures

Signatures

Signature Algorithm

Hash Functions

Hash Functions

Time Stamps

Pretty Good Privacy - PGP

Certificates and Digital I.D.

Certification Authority
(Trusted Agents)

Digital Millennium Copyright Act

Reference Books

Web Resources