SlideShare a Scribd company logo
1 of 21
PRESENTED BY:

          JATIN KAKKAR          -
26
          JESO P . JAMES - 28
•   INTODUCTION
•   HISTORY
•   OBEJECTIVE & OVERVIEW
•   APPLICATIONS
•   CRYPTOGRAPHY COMPONENTS
•   TERMINOLOGY
•   ASPECTS
•   TYPES OF CRYPTOGRAPHY
•   ADVANTAGES
•   CONCLUSION
•   REFERENCES
• Cryptography is the science of
  information security.
• The word is derived from the
  Greek kryptos, meaning hidden.
• Cryptography includes techniques
  such as microdots, merging words
  with images, and other ways to
  hide information in storage or
  transit.
• Confidentiality:- the information cannot be understood
  by anyone for whom it was unintended.
• Integrity :-the information cannot be altered in storage
  or transit between sender and intended receiver without
  the alteration being detected.
• Authentication :-the sender and receiver can confirm
  each others identity and the origin/destination of the
  information.
Overview of Cryptography & Its
               Applications
• People wants and needs privacy and security while
  communicating.

• In the past, cryptography is heavily used for military
  applications to keep sensitive information secret from
  enemies (adversaries).

• Nowadays, with the technologic progress as our
  dependency on electronic systems has increased we need
  more sophisticated techniques.

• Cryptography provides most of the methods and techniques
  for a secure communication
Cryptography components




             6
• Encryption – It is a process of changing or
  converting normal text or data information into
  gibberish text.

• Decryption – It is a process of changing or
  converting gibberish text back to correct
  message or data by using encryption method.
Terminology
Cryptology : All-inclusive term used for the study of secure
communication over non-secure channels.

Cryptography : The process of designing systems to realize
secure communications over non-secure channels.

Cryptoanalysis : The discipline of breaking the cryptographic
systems.

Coding Theory : Deals with representing the information
using codes. It covers compression, secrecy, and
error correction.
The Aspects of Cryptography
• Modern cryptography heavily depends on mathematics and
  the usage of digital systems.

• It is a inter-disciplinary study of basically three fields:
  Mathematics
  Computer Science
  Electrical Engineering

• Without having a complete understanding of crypto analysis
  (or cryptoanalytic techniques) it is impossible to design
  good (secure, unbreakable) cryptographic systems.

• It makes use of other disciplines such as error-correcting codes
  compression.
Categories of cryptography




              10
• A single common encryption key is used to
    encode and decode messages.
•   Both sender and receiver must know the
    common key.
•   The common key need to be exchanged
    before hand by some other secure method.
•   Symmetric encryption is simple and fast.
•   But - key management is impractical with
    large number of senders and receivers.


                                         11
Symmetric-key cryptography




               11
Asymmetric-key cryptography

• Asymmetric system under, which two different
  keys are used to encrypt and decrypt the
  message or received data packet.
• On public key is used to encrypt the data or
  message and the private key on receiving end
  is used to decrypt the message or data
  packet.
• Each user has a Public key and a
  corresponding Private (secret) key


                                         12
Asymmetric-key cryptography
Keys used in cryptography
• Sender”sign” messages by means of his
  private secret key.
• Recipient verify the senders signature by
  means of the senders public key.
• The senders identity is certified by means of
  a”Certificate” which is digitally signed by a
  trusted third party.
• public-key cryptography Increased security
  and convenience.
• public-key cryptography is best suited for an
  open multi-user environment.
• Symmetric encryption is simple and fast.
• cryptography = physics + Information
  theory

• Information is physical.

• Information gain implies disturbances.
Crytography
Crytography

More Related Content

What's hot

Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Cryptography
CryptographyCryptography
Cryptography
LaibaRehman3
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
Prabhat Goel
 
Computer network
Computer networkComputer network
Computer network
snegacmr
 

What's hot (19)

Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet Network
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Computer network
Computer networkComputer network
Computer network
 
Ccn
CcnCcn
Ccn
 

Viewers also liked

High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
nitin3940
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
Agate Studio
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Privacy Options on SlideShare
Privacy Options on SlideSharePrivacy Options on SlideShare
Privacy Options on SlideShare
Shivani Ramnath
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 

Viewers also liked (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
How circuit switches
How circuit switchesHow circuit switches
How circuit switches
 
Week13
Week13Week13
Week13
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Aes
AesAes
Aes
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Privacy Options on SlideShare
Privacy Options on SlideSharePrivacy Options on SlideShare
Privacy Options on SlideShare
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 

Similar to Crytography

information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
jemtallon
 

Similar to Crytography (20)

chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography
Cryptography Cryptography
Cryptography
 
04 authentication
04 authentication04 authentication
04 authentication
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Recently uploaded (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

Crytography

  • 1. PRESENTED BY: JATIN KAKKAR - 26 JESO P . JAMES - 28
  • 2. INTODUCTION • HISTORY • OBEJECTIVE & OVERVIEW • APPLICATIONS • CRYPTOGRAPHY COMPONENTS • TERMINOLOGY • ASPECTS • TYPES OF CRYPTOGRAPHY • ADVANTAGES • CONCLUSION • REFERENCES
  • 3. • Cryptography is the science of information security. • The word is derived from the Greek kryptos, meaning hidden. • Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.
  • 4.
  • 5. • Confidentiality:- the information cannot be understood by anyone for whom it was unintended. • Integrity :-the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. • Authentication :-the sender and receiver can confirm each others identity and the origin/destination of the information.
  • 6. Overview of Cryptography & Its Applications • People wants and needs privacy and security while communicating. • In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies (adversaries). • Nowadays, with the technologic progress as our dependency on electronic systems has increased we need more sophisticated techniques. • Cryptography provides most of the methods and techniques for a secure communication
  • 8. • Encryption – It is a process of changing or converting normal text or data information into gibberish text. • Decryption – It is a process of changing or converting gibberish text back to correct message or data by using encryption method.
  • 9. Terminology Cryptology : All-inclusive term used for the study of secure communication over non-secure channels. Cryptography : The process of designing systems to realize secure communications over non-secure channels. Cryptoanalysis : The discipline of breaking the cryptographic systems. Coding Theory : Deals with representing the information using codes. It covers compression, secrecy, and error correction.
  • 10. The Aspects of Cryptography • Modern cryptography heavily depends on mathematics and the usage of digital systems. • It is a inter-disciplinary study of basically three fields: Mathematics Computer Science Electrical Engineering • Without having a complete understanding of crypto analysis (or cryptoanalytic techniques) it is impossible to design good (secure, unbreakable) cryptographic systems. • It makes use of other disciplines such as error-correcting codes compression.
  • 12. • A single common encryption key is used to encode and decode messages. • Both sender and receiver must know the common key. • The common key need to be exchanged before hand by some other secure method. • Symmetric encryption is simple and fast. • But - key management is impractical with large number of senders and receivers. 11
  • 14. Asymmetric-key cryptography • Asymmetric system under, which two different keys are used to encrypt and decrypt the message or received data packet. • On public key is used to encrypt the data or message and the private key on receiving end is used to decrypt the message or data packet. • Each user has a Public key and a corresponding Private (secret) key 12
  • 16. Keys used in cryptography
  • 17. • Sender”sign” messages by means of his private secret key. • Recipient verify the senders signature by means of the senders public key. • The senders identity is certified by means of a”Certificate” which is digitally signed by a trusted third party.
  • 18. • public-key cryptography Increased security and convenience. • public-key cryptography is best suited for an open multi-user environment. • Symmetric encryption is simple and fast.
  • 19. • cryptography = physics + Information theory • Information is physical. • Information gain implies disturbances.

Editor's Notes

  1. Transaction: