Cryptography deals with protection and
preservation of information in all its forms.
In cryptography field, encryption gets the
Early Applications and most attention for manipulating and
Examples protecting information
deals with unlocking or uncovering the
cryptanalysis secrets that others try so hard to hide
or obscure
اللي جي ده حصة تاريخ فمعلش استحمل شويه
The intricate patterns and glyphs used in
Egyptian hieroglyphics
الرموز المعقده المستخدمه في الهيلغروفيه المصريه
The ancient Egyptians were probably using
the system not so much to withhold secrets
but because they wanted a special writing
system to commune with their gods and
eternity.
لم يكونوا يستخدموه لحفظ األسرار بقدر ما كانوا يستخدموه في
التواصل مع الهتهم
It is believed that only members of the royal
family and the religious orders could fully
understand how to read and write the system
History of Cryptography and comprehend it fully.
the writing system became more complex;
eventually the public and those who could
write the language either passed away or
turned their interests to other endeavors, and
the ability to decipher the symbols was lost
for a time.
نظام الكتابه كان معقد فاللي كانوا بيعرفوا يكتبوا يا إما ماتوا أو
حولوا اهتمامتهم لشيء اخر
The Rosetta stone حجر رشيدwas the key that
allowed modern civilization to
understand a language that was
nearly lost
it took over 20 years of concerted effort to
reveal the language to the world once again.
One of the most widely used applications of
cryptography is in the safeguarding of
communications between two parties
wanting to share information.
من أهم الحاجات اللي بنستخدم فيها التشفير هي إننا نحافظ علي
التواصل بين طرفيين عشان يكون امن ومحدش يطلع علي الرسائل
In today’s world, not only must information
be kept secret, but provisions to detect
unwelcome or unwanted modifications are
Tracing the Evolution just as important.
في العصر الحالي مش بهتم بس بعدم قدرة طرف تاني علي قرايتها
بل برده باهتم بانه ميقدرش يعدلها
Is the body of knowledge relating to
in the first few generations of its existence,
cryptography concerned only with
the answer was yes, but that has changed
protecting information?
لو بنتكلم في األول فاالجابة اه لكن دلوقتي الموضوع اتغير
هل المعرفه بالتشفير مهتمه بس بالحمايه بتاعت البيانات؟
It is the primary goal that encryption seeks
to achieve.
Confidentiality Encryption is done to keep secret
information from disclosure, away from
prying eyes.
الغرض األساسي للتشفيرأصال هو أن المعلومات تبقي بعيده عن
أعين المتطفلين
Cryptography can detect changes in
Integrity information and thus prove its integrity or
original unmodified state.
Cryptography allows a person, object,
or party to be identified with a high
degree
Goals cryptography nowadays of confidence.
Authentication
seek to achieve Authentication is an essential component of
a secure system because it allows
software and other things to be positively
identified.
The ability to provide positive identification
of the source or originator of an
Nonrepudiation - عدم التنصل event is an important part of security
باختصار بيخليني أقدر أعرف مين عمل ايه عشان بعدين ميقدرش
يتنصل ويقول إنه معملش
One of the most valuable components of a
cryptosystem is the key, which is the
Key Distribution specific secret combination or code used
in a cryptographic function.
Plain text is the original message.
Plain Text/Clear Text it is the usable information.
It has not been altered
Cipher text is the opposite of plain text
it is a message or other data that has
Cipher Text been
transformed into a different format using a
mechanism known as an algorithm.
It is also something that can be reversed
using an algorithm and a key
بمعني إني لو معايا األلجوريزم والمفتاح أقدر أرجعها تاني ل
Cryptography How Does It Work?
plain text
transform clear text into cipher text.
Algorithms a formula that includes discrete steps that
describe how the encryption and decryption
process is to be performed in a given
instance.
A key is a discrete piece of information,
usually random in nature, that determines
the result or output of a given cryptographic
operation.
Keys It can be thought of in the same way a key in
the physical world is, as a special item used
to open or unlock something—in this case, a
piece of information.
هو شبه المفتاح في العالم الحقيقي زي ما األول بيستخدم في فتح
حاجه معينه ده هو الطريقه لفهم جزء من المعلومات عن طريق
تحويله مع األلجوريزم منcipher text to plain text
The Same key is used for both encryption
and decryption and must be kept secret
Preserving confidentiality
Increased speed over many non-
symmetric systems
symmetric algorithms are great at all of the
symmetric
following (advatages):
Ensuring simplicity (relatively speaking,
of course)
Providing authenticity
Key management issues
Symmetric algorithms have drawbacks in
these areas:
Lack of nonrepudiation features
عدم وجود ميزات عدم التنصل
The concept of public key cryptography
was intended to overcome the key
management problems inherent in
symmetric systems.
Types of cryptography
In this system, each user who is enrolled
receives a pair of keys called the public
key and the private key.
Each person’s public key is published,
whereas the private key is kept secret.
How it works
By creating the keys this way, the need
for a shared symmetric key is eliminated.
This option also secures the
communication against eavesdropping
التنصتor betrayal.الخيانة
asymmetric (aka public-key cryptography)
this system of generating keys provides
a means of nonrepudiation that is not
possible with symmetric systems.
Since anything encrypted with the
private key can be reversed only with the
corresponding public key and only one
Digital Signature person holds the private key, then the
identity of the encrypting party can be
assured
Hashing can be considered a type of one-
way encryption.
it is a process that creates a scrambled
output that cannot be reversed.
The process outputs is a hash value, or
message digest. (ex: Passwords storage)
Designed to be a one-way process, hashing
is commonly used to validate the integrity of
information.
بيحافظ علي البيانات بإنها ال يتم تعديلها أو التالعب بيها
hashing شخص عمل ملف كاتب فيه حاجات وعمله: مثال
عشان اللي استلم الملف يتأكد إن الملف ما اتعدلش المفروض
Understanding Hashing يتبعتله مع الملف الhashing function and hashing
value
Hashing function هو المفروض يطبق ال
لو طلعتله نفس الHashing value
اللي مبعوته ده معناها الملف لم يتم التعديل عليه وكده يبقي تمام لو
طلعت حاجه مغايره هيبقي معناها إن في حد لعب في الملف
A hash function generates a fixed-length
value that is always the same length no
matter how large or small the data entering
the process or algorithm is.
The fixed-length value is unique for every
different input that enters the process. It is
because of this unique property and its
behavior that hashes are used to detect the
changes that can happen
in data of any type.
Cryptographic systems are all vulnerable to
what is known as a brute-force attack.
In brute-force attack, every possible
combination of characters is tried in an
attempt to uncover a valid key.
باختصار المشكله إن كل التكنيكات دي متقدرش توقف الbtute-
Issues with Cryptography force attack