SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Cryptography –
Encryption/Decryption
What is Cryptography?
      Cryptography derived its name from a
      Greek word called “Kryptos” which
      means “Hidden Secrets”.

      Cryptography is the practice and study
      of hiding information. It is the Art or
      Science of converting a plain
      intelligible data into an unintelligible
      data and again retransforming that
      message into its original form.

      It provides
      Confidentiality, Integrity, Accuracy.
What is Encryption / Decryption

   Encryption –
    ◦ The process of converting plain text into an
      unintelligible format (cipher text) is called
      Encryption.


   Decryption –
    ◦ The process of converting cipher text into a plain
      text is called Decryption.
What are the Types of Cryptography
   Symmetric Key Cryptography (Secret Key Cryptography)
    ◦ Same Key is used by both parties
    Advantages
     1. Simpler and Faster

    Disadvantages
    1. Less Secured




Image taken from :-
www.google.com
   Asymmetric Key Cryptography (Public Key Cryptography)
    ◦ 2 different keys are used
    ◦ Users get the Key from an Certificate Authority

    Advantages
    1. More Secured
    2. Authentication

    Disadvantages
    1. Relatively Complex




Image taken from :-
www.google.com
   What is a Key
    ◦ In cryptography, a key is a variable value that is applied
      using an algorithm to a string or block of unencrypted text
      to produce encrypted text, or to decrypt encrypted text.
      The length of the key is a factor in considering how
      difficult it will be to decrypt the text in a given message.

   What is a Block Cipher?
    ◦ A method of encrypting / decrypting data
    ◦ Key is used for encryption / decryption.
    ◦ Same size of I/P and O/P

   What is Initialization Vector?
    ◦ An initialization vector (IV) is an arbitrary number that can
      be used along with a secret key for data encryption.
    ◦ It is a group of hex values.
   What is DES?
    ◦ The Data Encryption Standard (DES) is a previously predominant
      algorithm used for encryption/decryption of electronic data. DES
      was developed in the early 70’s by IBM which was then submitted
      to the National Bureau of Standards (NBS).

    ◦ Like other private key cryptographic methods, both the sender
      and the receiver must know and use the same private key.

    ◦ DES uses a 56 bit encryption key which can give around 2^56 (ie)
      256 combinations to encrypt the plain text. DES is restricted with
      a Block Size of just 64bits.

    ◦ Sometimes DES is said to use 64 bit key, but 8bits out of it is
      used for some other purpose.

    ◦ The maximum amount that can be transferred with a single
      encryption is 32GB. DES uses the Feistel Network which divides
      block into 2 halves before going through the encryption steps.
   What is AES?
    ◦ The Advanced Encryption Standard (AES) is a specification for
      the Encryption of electronic data. Originally called “Rijndael” the
      cipher was developed by 2 Belgian Cryptographers “Joan
      Daemen” and “Vincent Rijmen” who submitted to the AES
      Selection process held by the NIST (National Institute of
      Standards and Technology) in the year 1997 which continued for
      3 years and the end result was given on 2nd October 2002 where
      Rijndael was chosen as the proposed standard.

    ◦ The algorithm described by AES is a Symmetric-Key
      Algorithm, meaning the same key is used for encrypting and
      decrypting the data. AES standard is a variant of Rijndael where
      the block size is restricted to 128bits and the key size of
      128, 192, 256 bits can be used.

    ◦ AES is based on a design principle known as a substitution-
      permutation network, and is fast in both software and hardware.
DES Encryption                                      AES Encryption
DES uses only 56 bits key which provides a         AES can use 128, 192, 256 bits keys which
combination of 2^56 = 256 combinations for         provides 2^128, 2^192, 2^256 combinations for
encryption.                                        encryption.
DES is restricted to use a Block Size of only 64   AES is restricted to use a Block Size of 128 bits
bits                                               (double of what is used in DES)
With 64 bits block size, the amount of data that   With AES, it is possible to transfer around 256
can be transferred with a single encryption key    billion GB of data. It is probably safe to say that
is just 32GB.                                      you can use a single AES encryption key for
                                                   any application.
DES uses a Feistel network, which divides the      AES uses Permutation-Substitution method,
block into 2 halves before going through the       which involves a series of substitution and
Encryption steps.                                  permutation steps to create the encrypted
                                                   block.
DES encryption is breakable through Brute          AES encryption on the other hand is still not
Force attack.                                      breakable, though there are some theoretical
                                                   discussions about breaking the AES.
DES is an old technique used for                   AES is relatively new.
encryption/decryption
Time required to check all the possible keys at    Time required to check all the possible keys at
50 billion keys per second – For a 128-bit key:    50 billion keys per second – For a 56-bit key:
5x1021 years (which makes it difficult for the     400 days.
hackers to decrypt the data)
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 

Was ist angesagt? (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Hash function
Hash function Hash function
Hash function
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Network security
Network securityNetwork security
Network security
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography
CryptographyCryptography
Cryptography
 
Web Security
Web SecurityWeb Security
Web Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Message authentication
Message authenticationMessage authentication
Message authentication
 

Andere mochten auch

Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphersRoman Oliynykov
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSukhvir Sabharwal
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyTim O'Reilly
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networksSnehil Rastogi
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationOrange Slides
 

Andere mochten auch (20)

cryptography
cryptographycryptography
cryptography
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
 
E - governance
E - governanceE - governance
E - governance
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
E governance
E governanceE governance
E governance
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
types of network
types of networktypes of network
types of network
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Cryptography
CryptographyCryptography
Cryptography
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
 

Ähnlich wie Cryptography

IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfDhamuKing1
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDharani675311
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 

Ähnlich wie Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Encryption
EncryptionEncryption
Encryption
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Cryptography

  • 2.
  • 3. What is Cryptography? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 4. What is Encryption / Decryption  Encryption – ◦ The process of converting plain text into an unintelligible format (cipher text) is called Encryption.  Decryption – ◦ The process of converting cipher text into a plain text is called Decryption.
  • 5. What are the Types of Cryptography  Symmetric Key Cryptography (Secret Key Cryptography) ◦ Same Key is used by both parties Advantages 1. Simpler and Faster Disadvantages 1. Less Secured Image taken from :- www.google.com
  • 6. Asymmetric Key Cryptography (Public Key Cryptography) ◦ 2 different keys are used ◦ Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex Image taken from :- www.google.com
  • 7. What is a Key ◦ In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the text in a given message.  What is a Block Cipher? ◦ A method of encrypting / decrypting data ◦ Key is used for encryption / decryption. ◦ Same size of I/P and O/P  What is Initialization Vector? ◦ An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption. ◦ It is a group of hex values.
  • 8. What is DES? ◦ The Data Encryption Standard (DES) is a previously predominant algorithm used for encryption/decryption of electronic data. DES was developed in the early 70’s by IBM which was then submitted to the National Bureau of Standards (NBS). ◦ Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key. ◦ DES uses a 56 bit encryption key which can give around 2^56 (ie) 256 combinations to encrypt the plain text. DES is restricted with a Block Size of just 64bits. ◦ Sometimes DES is said to use 64 bit key, but 8bits out of it is used for some other purpose. ◦ The maximum amount that can be transferred with a single encryption is 32GB. DES uses the Feistel Network which divides block into 2 halves before going through the encryption steps.
  • 9. What is AES? ◦ The Advanced Encryption Standard (AES) is a specification for the Encryption of electronic data. Originally called “Rijndael” the cipher was developed by 2 Belgian Cryptographers “Joan Daemen” and “Vincent Rijmen” who submitted to the AES Selection process held by the NIST (National Institute of Standards and Technology) in the year 1997 which continued for 3 years and the end result was given on 2nd October 2002 where Rijndael was chosen as the proposed standard. ◦ The algorithm described by AES is a Symmetric-Key Algorithm, meaning the same key is used for encrypting and decrypting the data. AES standard is a variant of Rijndael where the block size is restricted to 128bits and the key size of 128, 192, 256 bits can be used. ◦ AES is based on a design principle known as a substitution- permutation network, and is fast in both software and hardware.
  • 10. DES Encryption AES Encryption DES uses only 56 bits key which provides a AES can use 128, 192, 256 bits keys which combination of 2^56 = 256 combinations for provides 2^128, 2^192, 2^256 combinations for encryption. encryption. DES is restricted to use a Block Size of only 64 AES is restricted to use a Block Size of 128 bits bits (double of what is used in DES) With 64 bits block size, the amount of data that With AES, it is possible to transfer around 256 can be transferred with a single encryption key billion GB of data. It is probably safe to say that is just 32GB. you can use a single AES encryption key for any application. DES uses a Feistel network, which divides the AES uses Permutation-Substitution method, block into 2 halves before going through the which involves a series of substitution and Encryption steps. permutation steps to create the encrypted block. DES encryption is breakable through Brute AES encryption on the other hand is still not Force attack. breakable, though there are some theoretical discussions about breaking the AES. DES is an old technique used for AES is relatively new. encryption/decryption Time required to check all the possible keys at Time required to check all the possible keys at 50 billion keys per second – For a 128-bit key: 50 billion keys per second – For a 56-bit key: 5x1021 years (which makes it difficult for the 400 days. hackers to decrypt the data)