SlideShare a Scribd company logo
1 of 22
CRYPOGRAPHY
ENCRYPTION and
DECRYPTION
Some Basic Terms
 Plain Text/Clear Text :Data that can be read and
  understood without any special measure.
 Cipher Text :The unreadable plain text after
  encryption.
 Encryption :The method of disguising to hide its
  substance.
 Decryption :The method of reverting cipher text to
  its original plain text.
CRYPTANALYSIS vs. CRYPTOGRAPHY?
 Cryptography is a science of using mathematics to
  encrypt and decrypt data. It enable us to store and
  transmit sensitive data over unsecure network.
 Cryptanalysis is the science of analyzing and breaking
  secure communication.
CONVENTIONAL CRYPTOGRAPHY
 In conventional cryptography(symmetric key
  encryption)one key is used both for encryption and
  decryption.
 i.e. Caesar’s cipher
 This cryptography is very fast but is quite expensive
  due to difficulty of secure key distribution.
PUBLIC KEY CRYPTOGRAPHY
 It uses two key, one key for encryption(public key) and
  one for decryption(private key).
 We publish the data with the public key to the world
  while keeping the private key.
 The need for sender and receiver to share secret key
  via some secure channel is eliminated.
HYBRID CRYPTOGRAPHY
Combines strengths of both methods
Asymmetric distributes symmetric key.
 Also known as a session key(one time
 only secret key).
 Symmetric provides bulk encryption
i.e. PGP
KEYS
 Work with cryptographic algorithm to produce a
  specific cipher text.
 Larger keys are secure for longer period of time.
STEGANOGRAPHY
 Greek for “covered writing”


 “The art and science of writing hidden messages in
  such a way that no one apart from the intended
  recipient even knows that a message has been sent.”
 It makes use of seemingly innocent cover files such as
  text, audio, and image files
IMAGE BASED TECHNIQUE
 Least Significant Bit Insertion
 Replaces the LSB with the message to be encoded.
 Simple, but susceptible to lossy compression and
  image manipulation
 Masking and Filtering
 Masks secret data over the original data by changing
  the luminance of particular areas
 During masking, it embed the message within
  significant bits of the cover image
 Digital Watermarking – provides identification
 pertaining to the owner; i.e. license or copyright
 information
 - Invisible vs. Visible

 Fingerprinting – provides identification of the user;
 used to identify and track illegal use of content
WATERMARK
WEB HOSTING
 A web hosting is a type of Internet hosting that allows
 individuals and organizations to make their website
 accessible via the World Wide Web or locally in the
 network.

 The most basic is web page and small-scale file
 hosting, where files can be uploaded via File Transfer
 Protocol (FTP) on the server.
DNS
 A Domain Name Service translates queries for domain
 names (which are easier to understand and utilize
 when accessing the internet) into IP addresses for the
 purpose of locating computer services and devices
 worldwide.

 For example, the domain name
 www.ethicalpirates.com translates to the addresses
 172.16.32.254 (IPv4).
APACHE (Web Server)


 Web servers are computers that deliver (serves up)
 Web pages. Every Web server has an IP address and
 possibly a domain name.

 Any computer can be turned into a Web server by
 installing server software and connecting the machine
 to the internet
FIREWALL
 A firewall is a rule or set of rules create to permit or
  deny network transmissions based on a set of rules and
  is frequently used to protect networks from
  unauthorized access while permitting legitimate
  communications to pass.

 Firewalls are frequently used to prevent unauthorized
  Internet users from accessing private networks
  connected to the Internet, especially intranets.
 i.e. Packet Filter, Proxy Server etc.
REFERENCES
 www.jjtc.com/stegdoc/steg1995.html
 “Information Hiding: Techniques for Steganography
  and Digital Watermarking” – S. Katzenbeisser, F. Petit
  colas
 “RSA Security’s Official Guide to Cryptography” by S.
  Burnett and S. Paine, Osborne/McGraw-Hill, 2001
 The Code Breaker-David Khan

More Related Content

What's hot

How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storageLeMeniz Infotech
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storageLeMeniz Infotech
 

What's hot (17)

Week13
Week13Week13
Week13
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Encryption
EncryptionEncryption
Encryption
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
s117
s117s117
s117
 
Week13
Week13Week13
Week13
 
Cryptography
CryptographyCryptography
Cryptography
 
Week13
Week13Week13
Week13
 
Week11
Week11Week11
Week11
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 
Steganography
SteganographySteganography
Steganography
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Week13
Week13Week13
Week13
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 

Viewers also liked

Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processingAshish Kumar
 
02 psychovisual perception DIP
02 psychovisual perception DIP02 psychovisual perception DIP
02 psychovisual perception DIPbabak danyal
 
04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIPbabak danyal
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using PythonKarim Sonbol
 
07 frequency domain DIP
07 frequency domain DIP07 frequency domain DIP
07 frequency domain DIPbabak danyal
 
Image processing spatialfiltering
Image processing spatialfilteringImage processing spatialfiltering
Image processing spatialfilteringJohn Williams
 
01 introduction DIP
01 introduction DIP01 introduction DIP
01 introduction DIPbabak danyal
 
Digitized images and
Digitized images andDigitized images and
Digitized images andAshish Kumar
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2Gichelle Amon
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1Gichelle Amon
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processingAsad Ali
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Image pre processing-restoration
Image pre processing-restorationImage pre processing-restoration
Image pre processing-restorationAshish Kumar
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIPbabak danyal
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domainAshish Kumar
 
05 histogram processing DIP
05 histogram processing DIP05 histogram processing DIP
05 histogram processing DIPbabak danyal
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIPbabak danyal
 
10 color image processing
10 color image processing10 color image processing
10 color image processingbabak danyal
 
Image enhancement
Image enhancementImage enhancement
Image enhancementAyaelshiwi
 

Viewers also liked (20)

Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processing
 
02 psychovisual perception DIP
02 psychovisual perception DIP02 psychovisual perception DIP
02 psychovisual perception DIP
 
04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using Python
 
07 frequency domain DIP
07 frequency domain DIP07 frequency domain DIP
07 frequency domain DIP
 
Image processing spatialfiltering
Image processing spatialfilteringImage processing spatialfiltering
Image processing spatialfiltering
 
01 introduction DIP
01 introduction DIP01 introduction DIP
01 introduction DIP
 
applist
applistapplist
applist
 
Digitized images and
Digitized images andDigitized images and
Digitized images and
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processing
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Image pre processing-restoration
Image pre processing-restorationImage pre processing-restoration
Image pre processing-restoration
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIP
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domain
 
05 histogram processing DIP
05 histogram processing DIP05 histogram processing DIP
05 histogram processing DIP
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIP
 
10 color image processing
10 color image processing10 color image processing
10 color image processing
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 

Similar to online game over cryptography

Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
Chapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thChapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thJinElias52
 
Chapter 08
Chapter 08Chapter 08
Chapter 08cclay3
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptxabbu03oct
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12s1190091
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 
Frsa
FrsaFrsa
Frsa_111
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 

Similar to online game over cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Chapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thChapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of th
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
cryptography
cryptographycryptography
cryptography
 
Frsa
FrsaFrsa
Frsa
 
Network security
Network securityNetwork security
Network security
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 

More from Ashish Kumar

Computer architecture
Computer architecture Computer architecture
Computer architecture Ashish Kumar
 
Introduction vision
Introduction visionIntroduction vision
Introduction visionAshish Kumar
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processingAshish Kumar
 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 
process management
 process management process management
process managementAshish Kumar
 
resource management
  resource management  resource management
resource managementAshish Kumar
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
video compression techique
video compression techiquevideo compression techique
video compression techiqueAshish Kumar
 

More from Ashish Kumar (20)

Computer architecture
Computer architecture Computer architecture
Computer architecture
 
Lecture2 color
Lecture2 colorLecture2 color
Lecture2 color
 
Introduction vision
Introduction visionIntroduction vision
Introduction vision
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processing
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
Data structures
Data structuresData structures
Data structures
 
Lecture2 light
Lecture2 lightLecture2 light
Lecture2 light
 
process management
 process management process management
process management
 
resource management
  resource management  resource management
resource management
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
message passing
 message passing message passing
message passing
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
color
colorcolor
color
 
system design
system designsystem design
system design
 
video compression techique
video compression techiquevideo compression techique
video compression techique
 
Compression
CompressionCompression
Compression
 
1.animation
1.animation1.animation
1.animation
 
MHEG
MHEGMHEG
MHEG
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

online game over cryptography

  • 3. Some Basic Terms  Plain Text/Clear Text :Data that can be read and understood without any special measure.  Cipher Text :The unreadable plain text after encryption.  Encryption :The method of disguising to hide its substance.  Decryption :The method of reverting cipher text to its original plain text.
  • 4. CRYPTANALYSIS vs. CRYPTOGRAPHY?  Cryptography is a science of using mathematics to encrypt and decrypt data. It enable us to store and transmit sensitive data over unsecure network.  Cryptanalysis is the science of analyzing and breaking secure communication.
  • 6.  In conventional cryptography(symmetric key encryption)one key is used both for encryption and decryption.  i.e. Caesar’s cipher  This cryptography is very fast but is quite expensive due to difficulty of secure key distribution.
  • 8.  It uses two key, one key for encryption(public key) and one for decryption(private key).  We publish the data with the public key to the world while keeping the private key.  The need for sender and receiver to share secret key via some secure channel is eliminated.
  • 10. Combines strengths of both methods Asymmetric distributes symmetric key.  Also known as a session key(one time only secret key).  Symmetric provides bulk encryption i.e. PGP
  • 11. KEYS  Work with cryptographic algorithm to produce a specific cipher text.  Larger keys are secure for longer period of time.
  • 12. STEGANOGRAPHY  Greek for “covered writing”  “The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  It makes use of seemingly innocent cover files such as text, audio, and image files
  • 13. IMAGE BASED TECHNIQUE  Least Significant Bit Insertion  Replaces the LSB with the message to be encoded.  Simple, but susceptible to lossy compression and image manipulation  Masking and Filtering  Masks secret data over the original data by changing the luminance of particular areas  During masking, it embed the message within significant bits of the cover image
  • 14.  Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs. Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 17.  A web hosting is a type of Internet hosting that allows individuals and organizations to make their website accessible via the World Wide Web or locally in the network.  The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) on the server.
  • 18. DNS  A Domain Name Service translates queries for domain names (which are easier to understand and utilize when accessing the internet) into IP addresses for the purpose of locating computer services and devices worldwide.  For example, the domain name www.ethicalpirates.com translates to the addresses 172.16.32.254 (IPv4).
  • 19. APACHE (Web Server)  Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name.  Any computer can be turned into a Web server by installing server software and connecting the machine to the internet
  • 21.  A firewall is a rule or set of rules create to permit or deny network transmissions based on a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.  Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.  i.e. Packet Filter, Proxy Server etc.
  • 22. REFERENCES  www.jjtc.com/stegdoc/steg1995.html  “Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petit colas  “RSA Security’s Official Guide to Cryptography” by S. Burnett and S. Paine, Osborne/McGraw-Hill, 2001  The Code Breaker-David Khan