SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY COMPONENTS ,[object Object]
CRYPTOGRAPHY COMPONENTS ,[object Object],[object Object]
CATEGORIES OF CRYPTOGRAPHY ,[object Object]
SYMMETRIC-KEY CRYPTOGRAPHY ,[object Object],[object Object]
SYMMETRIC-KEY CRYPTOGRAPHY ,[object Object],[object Object]
TRADITIONAL CIPHERS ,[object Object],[object Object],[object Object]
MONOALPHABETIC EXAMPLE ,[object Object],[object Object],[object Object]
SUBSTITUTION CIPHER ,[object Object],[object Object],[object Object],[object Object]
SUBSTITUTION CIPHER ,[object Object],[object Object],[object Object],[object Object]
TRANSPOSITION CIPHERS ,[object Object],[object Object],[object Object],[object Object],[object Object]
TRANSPOSITION CIPHERS ,[object Object],[object Object],[object Object],[object Object]
SIMPLE MODERN CIPHERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASYMMETRIC-KEY CRYPTOGRAPHY ,[object Object],[object Object],[object Object]
COMPARISON BETWEEN TWO CATEGORIES OF CRYPTOGRAPHY
NETWORK SECURITY
MESSAGE CONFIDENTIALITY ,[object Object],[object Object]
MESSAGE INTEGRITY ,[object Object],[object Object],[object Object],[object Object]
MESSAGE INTEGRITY ,[object Object],[object Object]
MESSAGE AUTHENTICATION ,[object Object]
MESSAGE NONREPUDIATION ,[object Object],[object Object]
ENTITY AUTHENTICATION ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Cryptography
CryptographyCryptography
Cryptographyprasham95
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Anas Rock
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2infosecedu
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
My cryptography
My cryptographyMy cryptography
My cryptographyNAVYA RAO
 

Was ist angesagt? (20)

Ch02 classic nemo
Ch02 classic nemoCh02 classic nemo
Ch02 classic nemo
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 

Andere mochten auch

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganographyNikhil l
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 

Andere mochten auch (20)

Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Hash
HashHash
Hash
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
A data analyst view of Bigdata
A data analyst view of Bigdata A data analyst view of Bigdata
A data analyst view of Bigdata
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Ähnlich wie Lecture 11

Network Security
Network SecurityNetwork Security
Network SecurityRitam Das
 
Cryptography
CryptographyCryptography
Cryptographyfsl khan
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxdesalewminale
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfParshantYadav13
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docxmariuse18nolet
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureMike Gates
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jhaManishaJha43
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Journals
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docxrobert345678
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 

Ähnlich wie Lecture 11 (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Cyptography ece 702
Cyptography ece 702Cyptography ece 702
Cyptography ece 702
 
Cyptography ece 702
Cyptography ece 702Cyptography ece 702
Cyptography ece 702
 
Computer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdfComputer Network Unit-5 (Part-1).pdf
Computer Network Unit-5 (Part-1).pdf
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Crypt
CryptCrypt
Crypt
 
Crypto
CryptoCrypto
Crypto
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography
CryptographyCryptography
Cryptography
 

Lecture 11