National Security Agency
Very powerful surveillance program from NSA.
Study of techniques for secure communication!
Something used to convert a message to nonsense!
The simplest Example would be: Ceaser Cipher!
converts: I LOVE YOU to
When the Key is: 20
Each letter is shifted by the key!
Explain this. Suppose the key is One. And the message is ABCD Then after performing Ceaser Cipher, the message becomes BCDE. To Get it backJust shift in opposite direction!
Explain What's happening here. You are using a same key to convert the message to nonsense, and the same key to get it back. Unless you have the key, You cannot decryptOne can sit all day and try all 26 combinations!
Tell, this technique is called brute-forcing. Trying all combinations until you get to the result. All crypto can be decrypted using brute force. The only problem is: Is it feasible/possible to brute force!Use same key for encryption and Decryption Example: Ceaser Cipher!
Demonstration of symmetric key encryption.
g = 5, p = 23, a=6 (secret) A=ga mod p A=56mod 23=8 send it to bob, bob choses b=15 (secret) B=gbmod p B=515mod 23=19 send it to alice now bob computes s=Abmod p s = 815mod 23=2 and alice computes s=Bamod p s = 196mod 23=2It uses two different keys for encryption and decryption.
Two Keys (A pair)
Pretty Good Privacy
is an Hybrid CryptoSystem.
...Is an free implementation of OpenPGP standard!
Generating keys, (gpg --gen-keys)
Exporting keys to public key server (gpg --keyserver pgp.mit.edu --send-key [id])
Importing keys of your friends from public key server (gpg --search-keys --keyserver pgp.mit.edu "[email]") (gpg --recv-keys --keyserver pgp.mit.edu [key_id])
Encrypting a message and sending (gpg --encrypt-files)
Decrypting a received files (gpg --decrypt-files)
Signing a message
Using enigmail with thunderbird