SlideShare a Scribd company logo
1 of 40
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA SUBMITTED BY: PARUL MEHRA NRO0192077 INFORMATION TECHNOLOGY TRAINING SUBMITTED TO: MR. ROHIT SHARMA MR. SATISH KUMAR ITT CENTRE AMRITSAR
A PROJECT REPORT ON CRYPTOGRAPHY
Cryptography
What is Cryptography? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Brief History of Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
Crypto Terms ,[object Object],[object Object],[object Object],[object Object]
Cryptography Broken Down ,[object Object],[object Object],[object Object],[object Object],[object Object]
Symmetric Cryptosystem   ,[object Object],[object Object],[object Object],[object Object]
Symmetric Cryptosystem
Symmetric Challenge ,[object Object],[object Object],[object Object],[object Object]
Key Management ,[object Object],[object Object],[object Object]
Introduction of the Public Key   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure
Idea behind Public Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptanalysis Terms ,[object Object],[object Object],[object Object]
Crypto System Properties ,[object Object],[object Object],[object Object]
Secrecy Requirements ,[object Object],[object Object]
Authenticity   Requirements   ,[object Object],[object Object]
Digital Encryption Standard(DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications of DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do We Encrypt? ,[object Object],[object Object],Symmetric  encryption:  decryption is the same cryptovariable ciphertext plaintext protocol
How could we break this? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Substitution Cipher ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Perfect Cryptosystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enigma Machine  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Enigma Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modern Symmetric Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key   Distribution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Paradigm Shift ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A, B agree on information Y A computes A(Y) Mails it to B B computes B(Y) Mails it to A Alcomputes A(B(Y)) B computes B(A(Y)) A(B(Y)) = B(A(Y)) = secret key “ E” knows Y, A(Y), B(Y), but can’t compute key Problem:  how do you make A(B(Y)) = B(A(Y))?
Diffie-Hellman-Merkle (1976) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One-way Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptographic Primitives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trapdoor One-Way Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature Process
Revolution ,[object Object],[object Object],[object Object],[object Object]
Quantum Computation ,[object Object],[object Object],[object Object],[object Object]
THANK YOU

More Related Content

What's hot (20)

Introduction to accounting software tally
Introduction to accounting software tallyIntroduction to accounting software tally
Introduction to accounting software tally
 
Invest India
Invest India Invest India
Invest India
 
Unified Payments Interface (UPI)
Unified Payments Interface (UPI)Unified Payments Interface (UPI)
Unified Payments Interface (UPI)
 
tally ppt.pptx
tally ppt.pptxtally ppt.pptx
tally ppt.pptx
 
Introduction to Tally Prime.pptx
Introduction to Tally Prime.pptxIntroduction to Tally Prime.pptx
Introduction to Tally Prime.pptx
 
Artificial Intelligence and Accounting
Artificial Intelligence and AccountingArtificial Intelligence and Accounting
Artificial Intelligence and Accounting
 
Digital payments Presentations
Digital payments PresentationsDigital payments Presentations
Digital payments Presentations
 
ClearTax presentation
ClearTax presentationClearTax presentation
ClearTax presentation
 
Paytm ppt
Paytm pptPaytm ppt
Paytm ppt
 
Digital currency
Digital currency Digital currency
Digital currency
 
Tally project
Tally projectTally project
Tally project
 
Startup India PPT
Startup  India PPTStartup  India PPT
Startup India PPT
 
china v/s india ppt
china v/s india pptchina v/s india ppt
china v/s india ppt
 
chartered accountant
chartered accountantchartered accountant
chartered accountant
 
Digital india Presentation
Digital india PresentationDigital india Presentation
Digital india Presentation
 
Digital locker
Digital lockerDigital locker
Digital locker
 
Digital Payments
Digital PaymentsDigital Payments
Digital Payments
 
Gst in tally
Gst in tallyGst in tally
Gst in tally
 
Tally
TallyTally
Tally
 
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
a brief introduction IN IT & ITES INDUSTRIES IN INDIA.
 

Viewers also liked

Microsoft Excel Project 1 Presentation
Microsoft Excel Project 1 PresentationMicrosoft Excel Project 1 Presentation
Microsoft Excel Project 1 Presentationjmartinvvc
 
MS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMridul Bansal
 
ITT project ON types of operating system
ITT project ON types of operating systemITT project ON types of operating system
ITT project ON types of operating systemJiohj Etzs
 
MS-EXCEL Assignment Help
MS-EXCEL Assignment HelpMS-EXCEL Assignment Help
MS-EXCEL Assignment HelpRahul Kataria
 
Teaching Excel
Teaching ExcelTeaching Excel
Teaching Excelsam ran
 
Microsoft word presentation
Microsoft word presentationMicrosoft word presentation
Microsoft word presentationegirshovich
 
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)Nikhil Dhawan
 
GST Power Point Presentation
GST Power Point PresentationGST Power Point Presentation
GST Power Point Presentationpraveendel
 
Functions and formulas of ms excel
Functions and formulas of ms excelFunctions and formulas of ms excel
Functions and formulas of ms excelmadhuparna bhowmik
 
Excel presentation data validation
Excel presentation   data validationExcel presentation   data validation
Excel presentation data validationNagamani Y R
 
Access presentation
Access presentationAccess presentation
Access presentationDUSPviz
 
Tally assingment book
Tally assingment bookTally assingment book
Tally assingment bookbatle18
 
Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids Queens Library
 
Ms Access ppt
Ms Access pptMs Access ppt
Ms Access pptanuj
 
Microsoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning ClassMicrosoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning ClassLady_Informationado
 
Benefits of E-Filing
Benefits of E-FilingBenefits of E-Filing
Benefits of E-Filingboscolegal
 

Viewers also liked (20)

Microsoft Excel Project 1 Presentation
Microsoft Excel Project 1 PresentationMicrosoft Excel Project 1 Presentation
Microsoft Excel Project 1 Presentation
 
MS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATION
 
Itt presentationn
Itt presentationnItt presentationn
Itt presentationn
 
ITT project ON types of operating system
ITT project ON types of operating systemITT project ON types of operating system
ITT project ON types of operating system
 
MS-EXCEL Assignment Help
MS-EXCEL Assignment HelpMS-EXCEL Assignment Help
MS-EXCEL Assignment Help
 
Teaching Excel
Teaching ExcelTeaching Excel
Teaching Excel
 
Microsoft word presentation
Microsoft word presentationMicrosoft word presentation
Microsoft word presentation
 
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
GST Power Point Presentation
GST Power Point PresentationGST Power Point Presentation
GST Power Point Presentation
 
Ppt on ms excel
Ppt on ms excelPpt on ms excel
Ppt on ms excel
 
Functions and formulas of ms excel
Functions and formulas of ms excelFunctions and formulas of ms excel
Functions and formulas of ms excel
 
Excel presentation data validation
Excel presentation   data validationExcel presentation   data validation
Excel presentation data validation
 
Access presentation
Access presentationAccess presentation
Access presentation
 
Tally assingment book
Tally assingment bookTally assingment book
Tally assingment book
 
Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids
 
Ms Access ppt
Ms Access pptMs Access ppt
Ms Access ppt
 
Microsoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning ClassMicrosoft Word 2010 Beginning Class
Microsoft Word 2010 Beginning Class
 
Benefits of E-Filing
Benefits of E-FilingBenefits of E-Filing
Benefits of E-Filing
 
E-Filing
E-FilingE-Filing
E-Filing
 

Similar to Itt project

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptnavidkamrava
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptographyPriyamvada Singh
 
introduction to cryptography (basics of it)
introduction to cryptography (basics of it)introduction to cryptography (basics of it)
introduction to cryptography (basics of it)neonaveen
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 

Similar to Itt project (20)

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
 
introduction to cryptography (basics of it)
introduction to cryptography (basics of it)introduction to cryptography (basics of it)
introduction to cryptography (basics of it)
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Itt project

  • 1. THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA SUBMITTED BY: PARUL MEHRA NRO0192077 INFORMATION TECHNOLOGY TRAINING SUBMITTED TO: MR. ROHIT SHARMA MR. SATISH KUMAR ITT CENTRE AMRITSAR
  • 2. A PROJECT REPORT ON CRYPTOGRAPHY
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. A, B agree on information Y A computes A(Y) Mails it to B B computes B(Y) Mails it to A Alcomputes A(B(Y)) B computes B(A(Y)) A(B(Y)) = B(A(Y)) = secret key “ E” knows Y, A(Y), B(Y), but can’t compute key Problem: how do you make A(B(Y)) = B(A(Y))?
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 38.
  • 39.

Editor's Notes

  1. Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans.
  2. There are two kinds of cryptosystems: symmetric and asymmetric . Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Asymmetric cryptosystems are also called public key cryptosystems.
  3. In traditional cryptography, the sender and receiver of a message know and use the same secret key; the sender uses the secret key to encrypt the message, and the receiver uses the same secret key to decrypt the message. This method is known as secret key or symmetric cryptography
  4. The main challenge is getting the sender and receiver to agree on the secret key without anyone else finding out. If they are in separate physical locations, they must trust a courier, a phone system, or some other transmission medium to prevent the disclosure of the secret key. Anyone who overhears or intercepts the key in transit can later read, modify, and forge all messages encrypted or authenticated using that key.
  5. The generation, transmission and storage of keys is called key management ; all cryptosystems must deal with key management issues. Because all keys in a secret-key cryptosystem must remain secret, secret-key cryptography often has difficulty providing secure key management, especially in open systems with a large number of users.
  6. In order to solve the key management problem, Whitfield Diffie and Martin Hellman introduced the concept of public-key cryptography in 1976. Public-key cryptosystems have two primary uses, encryption and digital signatures. In their system, each person gets a pair of keys, one called the public key and the other called the private key. The public key is published, while the private key is kept secret. The need for the sender and receiver to share secret information is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared. In this system, it is no longer necessary to trust the security of some means of communications. The only requirement is that public keys be associated with their users in a trusted (authenticated) manner (for instance, in a trusted directory). Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient.