WEBSITE - **`http://www.asecuritysite.com/encryption`**
# Cryptography
[Hard Core Predicate](#hard-core-predicate)
[Euclidean Algorithm](#euclidean-algorithm)
[One time Pad](#one-time-pad)
[Public Key Crptography](#public-key-crytography)
[Diffie-Hellman](#Diffie-Hellman)
[Elliptic Curve](#elliptic-curve)
[Randomness and pseudo randomness](#randomness-pseudo-randomness)
[Art of Problem](#fundamental-theorem-arithmetic)
[Symmetric Key Encryption](#symmetric-crytography)
[substitution/permutation networks](#substitution-permutation-networks)
[Block Ciphers](#block-cipher)
[Feistel Networks](#feistel-networks)
[Modes of Operation ECB, CBC, CFB, OFB](#modes-of-operation)
[Homomorphic Encryption](#homomorphic-encryption)
[Elgamal Encryption](#elgamal-encryption)
[Merkle-Hellman](#merkle-hellman)
[Discrete Logarthimic Problem](#discrete-logarthimic-problem)
[Collision Resistant Hashing](#collision-resistant-hashing)
[Public-Key-Infrastructures](#public-key-infrastructures)
[HMAC](#hmac)
[Quantum Cryptography](#quantum-cryptography)
[Identity Based Encryption](#identity-based-encryption)
[Lamport Scheme](#lamport-Scheme)
[Secure Online Purchasing](#secure-online-purchasing)
[Hybrid Encryption](#hybrid-encryption)
[chosen-plaintext attack](#choosen-plaintext-attack)
[choosen cipher text attack](#choosen-cipher-attack)
- - -
## Choosen Cipher Attack
## Choosen Plaintext Attack
## Hybrid Encryption
Hybrid encryption is a mode of encryption that merges two or more encryption systems. It incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. These strengths are respectively defined as speed and security.
Hybrid encryption is considered a highly secure type of encryption as long as the public and private keys are fully secure.
## Secure Online Purchashing
You enter your credit card numbers online, click “OK” and wait with bated breath for your CD to arrive the next day … but what about that lingering question of how secure you really are?
Cryptography, the process of encoding information, has been around since Julius Caesar’s day. In fact, the technology is so solid, a method that was revolutionary 30 years ago is still used today. It’s called public key cryptography, and despite being decades old, it makes secure Internet commerce easier.
Public key cryptography allows anyone to scramble a message (like credit card information) to an intended party, but it lets only that party unscramble it. It also plays a role in authentication (Is that really Amazon I’m ordering from?).
## Lamport Scheme
In cryptography, a Lamport signature or Lamport one-time signature scheme is a method for constructing a digital signature. Lamport signatures can be built from any cryptographically secure one-way function; usually a cryptographic hash function is used.
Although the potential development of quantum computers threatens the security of many common forms of cryptography such as RSA, it is believed that Lamport signatures with large hash functions would still be secure in that event. Unfortunately, each Lamport key can only be used to sign a single message. However, combined with hash trees, a single key could be used for many messages, making this a fairly efficient digital signature scheme.
## Identity Based Encryption
## Quantum Cryptography
In Quantum Cryptography, keys are exchanged through `quantum signals` if you see the below image!
![link](https://github.com/rakeshsukla53/Cryptography/blob/master/images/Quantum%20Cryptography/Selection_001.png)
If eve tries to extract the signals then `Quantum Bubbles` will be destroyed. Quantum signals will be destroyed like bubbles.
![link](https://github.com/rakeshsukla53/Cryptography/blob/master/images/Quantum%20Cryptography/Selection_002.png)
Eves dropping is almost impossible with Quantum Cryptography.
New keys are generated in less than a minute here.
![links](https://github.com/rakeshsukla53/Cryptography/blob/master/images/Quantum%20Cryptography/Selection_003.png)
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes (e.g., RSA and ElGamal) can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication (see below for examples). For example, It is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state.
## HMAC
HMAC stands for `Keyed-Hash Message Authentication Code`
Why we need HMAC? Because we want to know the integrity of the information transferred. HMAC ensures that the integrity of the message is not broken.
Generating HMAC is super easy!
From the `SENDER SIDE`
![HMAC](https://github.com/rakeshsukla53/Cryptography/blob/master/images/HMAC/Selection_001.png)
From the `RECEIVER SIDE`
![REC](https://github.com/rakeshsukla53/Cryptography/blob/master/images/HMAC/Selection_002.png)
Why we use `HMAC`not `MAC`?
![HMAC](https://github.com/rakeshsukla53/Cryptography/blob/master/images/HMAC/Selection_003.png)
Advantage of `HMAC` over `MAC`
![Advantage of HMAC](https://github.com/rakeshsukla53/Cryptography/blob/master/images/HMAC/Selection_004.png)
HMAC SPECIFICATION
![HMAC SPECIFICATION](https://github.com/rakeshsukla53/Cryptography/blob/master/images/HMAC/Selection_005.png)
Whole `Algorithm`
![Algorithm](https://github.com/rakeshsukla53/Cryptography/blob/master/images/HMAC/Selection_006.png)
## Public-Key-Infrastructures
PKI is a two key Asymmetric Cryptosystem. Its the same asymmetric algorithm but here `confidentiality` `integrity` and `authenticity` are extremely important.
![PKI](https://github.com/rakeshsukla53/Cryptography/blob/master/images/Public-Key-Infrastructures/Selection_002.png)
In PKI, it is important to know whether the party sending us the public key is a genuine or not? Because anyone can send his/her public key, but how do you verify the party is real!
For verifying your identity you have digital signatures, that can be initially shared to ensure the person is real not some intruder.
`Public Key` is associated with each `digital signature`
![KEY](https://github.com/rakeshsukla53/Cryptography/blob/master/images/Public-Key-Infrastructures/Selection_005.png)
You need to first share the digital signature and then send messages.
![Digital Signature](https://github.com/rakeshsukla53/Cryptography/blob/master/images/Public-Key-Infrastructures/Selection_006.png)
## Collision Resistant Hashing
Hash algorithms are often used for computing digital signatures. The signer of a message runs the original message through a hash algorithm to produce a digest value, then encrypts the digest to produce a signature. Someone verifying the signature will run the message through the same hash algorithm, and will decrypt the attached signature value to ensure the digest it contains matches the one they computed.
If collisions are easy to find, they allow an attacker to take an authentic digitally signed message, find a different message that produces the same digest (the collision), then substitute the fake message for the real one while keeping the same signature value. Someone trying to validate the signature won't be able to tell the difference. This destroys the value of digital signatures.
Testing is difficult. You can apply chi-squared tests and look for uneven digest bit distributions over a wide number of single- and multi- bit changes, but that's not proof. Most of the strength relies on the algorith
没有合适的资源?快使用搜索试试~ 我知道了~
应用密码学的项目和作业列表.zip
共82个文件
png:73个
py:5个
gitignore:1个
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 33 浏览量
2023-03-28
13:42:14
上传
评论
收藏 8.29MB ZIP 举报
温馨提示
应用密码学的项目和作业列表
资源推荐
资源详情
资源评论
收起资源包目录
应用密码学的项目和作业列表.zip (82个子文件)
Cryptography-master
.gitignore 781B
images
One-time-pad
Selection_001.png 169KB
Selection_002.png 103KB
Selection_003.png 122KB
Diffie Hellman
Selection_001.png 96KB
Selection_002.png 80KB
Selection_004.png 80KB
Selection_007.png 73KB
Selection_005.png 57KB
Selection_003.png 84KB
Selection_006.png 92KB
homomorphic encryption
Selection_001.png 124KB
HMAC
Selection_001.png 42KB
Selection_002.png 46KB
Selection_004.png 180KB
Selection_005.png 121KB
Selection_003.png 115KB
Selection_006.png 48KB
Public-Key-Infrastructures
Selection_001.png 107KB
Selection_002.png 113KB
Selection_004.png 84KB
Selection_005.png 101KB
Selection_003.png 86KB
Selection_006.png 147KB
Quantum Cryptography
Selection_001.png 97KB
Selection_002.png 156KB
Selection_003.png 127KB
Discrete-Mathematics
Selection_001.png 62KB
Selection_002.png 49KB
Euclidean Algorithm
Selection_002.png 65KB
Public Key Cryptography
Selection_001.png 67KB
Selection_002.png 65KB
Symmetric Crypography
Selection_001.png 196KB
Elliptic Curve
Selection_001.png 40KB
Selection_002.png 65KB
Selection_004.png 94KB
Selection_007.png 155KB
Selection_005.png 96KB
Selection_003.png 65KB
Selection_006.png 99KB
Block Cipher
Selection_012.png 73KB
Selection_011.png 74KB
Selection_010.png 227KB
Selection_013.png 125KB
Substitution Permutation Networks
Selection_001.png 94KB
Pseduo Random Generator
Selection_001.png 377KB
Modes of Operation
Selection_001.png 125KB
Selection_002.png 139KB
Selection_009.png 104KB
Selection_008.png 125KB
Selection_004.png 164KB
Selection_007.png 150KB
Selection_005.png 199KB
Selection_003.png 98KB
Selection_006.png 122KB
Hard_Core_Predicate
10.png 859KB
9.png 39KB
3.png 22KB
1.png 52KB
13.png 462KB
5.png 29KB
4.png 28KB
8.png 39KB
7.png 86KB
2.png 41KB
14.png 79KB
Feistal Networks
Selection_001.png 133KB
Selection_002.png 30KB
Selection_003.png 30KB
Art of Problems
Selection_001.png 54KB
Selection_002.png 57KB
Elgamal-Encryption
Selection_001.png 93KB
Selection_002.png 65KB
Selection_003.png 54KB
Project-1
__init__.py 22B
file.json 127KB
Sukla-Bagwe-source.py 3KB
encryption_generator.py 688B
Sukla-Bagwe-report.pdf 374KB
project1.py 3KB
Sukla-Bagwe-encryption_generator.py 1KB
README.md 28KB
共 82 条
- 1
资源评论
快撑死的鱼
- 粉丝: 1w+
- 资源: 9153
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功