SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Ancy mariam babu
    Vit university
 the need of multimedia secure
  transmission
 need of more security
 What is cryptography…???
   CRYPTOGRAPHY IS THE SCIENCE
    OF INFORMATION SECURITY
   The word is derived from
    greek kryptos means hidden
   Cryptography includes the
    techniques such as
    microdotes, merging words
    with images, other ways to
    hide information in storage
    or transit
   Objectives of cryptography
    are
          confidentiality
          integrity
          authentication
 Encryption  : it is the process of
  converting a plain text into
  (unrecognizable) cipher text.
 For strong encryption: two attributes
   -confusion
   -diffussion
 Decryption: it is the process of
  changing back the cipher text to
  plain text.
   A single common key is used for encode and decode
    of messages
   Both sender and receiver must know the common
    key
   The common key need to be exchange before hand
    by some other secure method
   Symmetric key encryption is fast and simple
   But the key management is impractical
 Two different key is used for
  encryption and decryption
 Public key is used for encryption and
  private key is used for decryption
 Each user has a public key and
  corresponding private key.
   Encryption is the
    process of converting
    plain text into cipher
    text.
   Done by using
    encryption
    algorithms
   Key is used
   Two types:
     -Asymmetric
      -symmetric
   Authentication
          -protects personal data such as
    passwords
   Privacy
           -provides for confidentiality of private
    information
   Integraty
           -ensures that a document or file not has
    been altered.
   Accountability
           - prevents denial or plagarism
 Web browser encryption
 Email encryption
 Hard drive encryption
 Operating system protection
   Encryption on video
   Twotypes
       - independent encryption
        -joint compression and encryption
 Both encryption and compression done
  seperatly
 Any compression standard can use for
  compression
 For encryption, can use either
    lightweight encription
               or
    heavyweight encryption
   Video encryption
    technique
   Huge computation
    overhead
   More secure
   Examples
   Des:
        - data encryption standard for electronic
    encryption
         -short key length and symmetric key block
    cipher
   Aes:
          -advanced encryption algorithm
          - symmetric key encryption
   Rsa:
          -public key scheme
          - difficulty for factoring large number
          -secure
   Video encryption
    technique
   Faster and simple
   Less complexity
   Less time cosumption
   examples
   Rc6
   Idea
   hb2
   Present
   Tea
   Both encryption and compression integrates as a
    single step
   System obtain multiple level of security
   Exaples
    1.vea
    2.rvea
   Two types
    1.compression before encryption
     2. compression after encryption
Cryptography and  encryption
Cryptography and  encryption
Cryptography and  encryption

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 

Was ist angesagt? (20)

Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 

Andere mochten auch

04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
The standard normal curve & its application in biomedical sciences
The standard normal curve & its application in biomedical sciencesThe standard normal curve & its application in biomedical sciences
The standard normal curve & its application in biomedical sciences
Abhi Manu
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
calix_ricia
 
Binomial probability distributions ppt
Binomial probability distributions pptBinomial probability distributions ppt
Binomial probability distributions ppt
Tayab Ali
 
STATISTICS: Normal Distribution
STATISTICS: Normal Distribution STATISTICS: Normal Distribution
STATISTICS: Normal Distribution
jundumaug1
 

Andere mochten auch (20)

Use of statistics in civil engineering
Use of statistics in civil engineeringUse of statistics in civil engineering
Use of statistics in civil engineering
 
1608 probability and statistics in engineering
1608 probability and statistics in engineering1608 probability and statistics in engineering
1608 probability and statistics in engineering
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
The standard normal curve & its application in biomedical sciences
The standard normal curve & its application in biomedical sciencesThe standard normal curve & its application in biomedical sciences
The standard normal curve & its application in biomedical sciences
 
Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Chapter9 the normal curve distribution
Chapter9 the normal curve distributionChapter9 the normal curve distribution
Chapter9 the normal curve distribution
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Importance of Maths in Engineering
Importance of Maths in EngineeringImportance of Maths in Engineering
Importance of Maths in Engineering
 
Binomial probability distributions ppt
Binomial probability distributions pptBinomial probability distributions ppt
Binomial probability distributions ppt
 
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDSAPPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
 
Normal Distribution, Binomial Distribution, Poisson Distribution
Normal Distribution, Binomial Distribution, Poisson DistributionNormal Distribution, Binomial Distribution, Poisson Distribution
Normal Distribution, Binomial Distribution, Poisson Distribution
 
STATISTICS: Normal Distribution
STATISTICS: Normal Distribution STATISTICS: Normal Distribution
STATISTICS: Normal Distribution
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 

Ähnlich wie Cryptography and encryption

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 

Ähnlich wie Cryptography and encryption (20)

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
network security
network securitynetwork security
network security
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
N45028390
N45028390N45028390
N45028390
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
week 12
week 12week 12
week 12
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Cryptography and encryption

  • 1. Ancy mariam babu Vit university
  • 2.  the need of multimedia secure transmission  need of more security  What is cryptography…???
  • 3. CRYPTOGRAPHY IS THE SCIENCE OF INFORMATION SECURITY  The word is derived from greek kryptos means hidden  Cryptography includes the techniques such as microdotes, merging words with images, other ways to hide information in storage or transit  Objectives of cryptography are confidentiality integrity authentication
  • 4.  Encryption : it is the process of converting a plain text into (unrecognizable) cipher text.  For strong encryption: two attributes -confusion -diffussion  Decryption: it is the process of changing back the cipher text to plain text.
  • 5.
  • 6.
  • 7. A single common key is used for encode and decode of messages  Both sender and receiver must know the common key  The common key need to be exchange before hand by some other secure method  Symmetric key encryption is fast and simple  But the key management is impractical
  • 8.
  • 9.  Two different key is used for encryption and decryption  Public key is used for encryption and private key is used for decryption  Each user has a public key and corresponding private key.
  • 10.
  • 11. Encryption is the process of converting plain text into cipher text.  Done by using encryption algorithms  Key is used  Two types: -Asymmetric -symmetric
  • 12.
  • 13.
  • 14. Authentication -protects personal data such as passwords  Privacy -provides for confidentiality of private information  Integraty -ensures that a document or file not has been altered.  Accountability - prevents denial or plagarism
  • 15.  Web browser encryption  Email encryption  Hard drive encryption  Operating system protection
  • 16. Encryption on video  Twotypes - independent encryption -joint compression and encryption
  • 17.  Both encryption and compression done seperatly  Any compression standard can use for compression  For encryption, can use either lightweight encription or heavyweight encryption
  • 18.
  • 19. Video encryption technique  Huge computation overhead  More secure
  • 20. Examples  Des: - data encryption standard for electronic encryption -short key length and symmetric key block cipher  Aes: -advanced encryption algorithm - symmetric key encryption  Rsa: -public key scheme - difficulty for factoring large number -secure
  • 21. Video encryption technique  Faster and simple  Less complexity  Less time cosumption
  • 22. examples  Rc6  Idea  hb2  Present  Tea
  • 23. Both encryption and compression integrates as a single step  System obtain multiple level of security  Exaples 1.vea 2.rvea  Two types 1.compression before encryption 2. compression after encryption