Anzeige
Anzeige

Más contenido relacionado

Anzeige

PRESENTATION ON CRYPTOGRAPHY.pptx

  1. Presented By: Ms. Riddhi Gupta BCA III Year Dept. of Computer Science Sophia Girls’ College (Autonomous) Ajmer. Presentation on CRYPTOGRAPHY Guided By: Dr. Ritu Bhargava Associate Professor Dept. of Computer Science Sophia Girls’ College (Autonomous) Ajmer.
  2. Learning OuTcome 2  Introduction  What is Cryptography?  Purpose of Cryptography  Architecture of Cryptography  Types of Cryptography  Process of cryptography  Conclusion  References
  3. INTRODUCTION  To secure network and data transmission via a wireless network, cryptography, and network encryption is being used. Providing data protection is one of the key aspects of wireless network data transmission.  The need for protection of the wireless network sensor is critical, and encryption and network security are necessary. Network security includes security for the terminal system as well as for the whole network system.  Network security is one of the main concerns as the world transitions into the digital world. Security of the network provides security for administrator-managed data. Increasing communication technology also requires safe communication which is met through various encryption techniques such as cryptography, digital signatures, and other applications. 3
  4. What is Cryptography? Cryptography derived its name from a Greek word called “krypto’s” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting plain intelligible data into unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, and Accuracy. Cryptography is a technique of encryption used to protect the network, as various networks are related and admire attacks and intrusions. Intrusion and computer protection technologies are also used in attack forms. 4
  5. 5
  6. PURPOSE OF CRYPTOGRAPHY  Authentication Privacy/confidentiality Integrity Non-repudiation 6
  7. Cryptography supports several security aims to provide the privacy of information, non- alteration of information, and so on. Because of the high-security benefit of cryptography, it is broadly used today. There are various goals of cryptography which are as follows −  Confidentiality − Information on the system is sent and has to be approached only by the authorized party and not by anyone else. Confidentiality has been negotiated if an unauthorized person can make a message. Confidentiality represents that sensitive data should be restricted from being disclosed to unauthorized parties.  Authentication − Authentication is any process by which it can test that someone is whom they claim they are. This generally includes a username and a password but can contain some other approach to demonstrating identities, such as a smart card, retina scan, voice identification, or fingerprints. Authentication is the same as showing the driver’s license at the ticket counter at the airport.  Integrity − It can only the authorized party is enabled to change the transmitted information. No one in between the sender and receiver is enabled to modify the given message. One approach to providing integrity is to connect a definite indicator or message digest at the end of the message that is active to be sent. If this digest remains undamaged during transit then the principle has been canned.  Non-repudiation - A mechanism to prove that the sender sent this message. 7
  8. Architecture of cryptography 8
  9. Types of Cryptography Secret Key Cryptography • Single key used to encrypt and decrypt. • Key must be known by both parties. • Assuming we live in a hostile environment (otherwise - why the need for cryptography?), it may be hard to share a secret key. 9
  10. Public Key Cryptography One of the keys allocated to each person is called the "public key" and is published in an open directory somewhere where anyone can easily look it up, for example by email address. Each entity has 2 keys:  Private Key (a secret)  Public key (well known). 10
  11. Using Keys  Private keys are used for decrypting.  Public keys are used for encrypting. 11
  12. Process of cryptography 12
  13. CONCLUSION  We use different types of algorithms to establish security services in different service mechanisms. We use either private key cryptography or public key cryptography according to requirement.  If we want to send a message quickly, we use the private key algorithm; if we want to send messages secretly, we use the public key algorithm. 13
  14. References www.researchgate.net www.swayam.com www.wikipedia.com 14
  15. Thanks…!!!

Hinweis der Redaktion

  1. 1
Anzeige