SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Guided by            VIBJAN
KOLAPATI
Mrs. SHEENA MATHEW    CS-B,ROLL
NO:97
   INTRODUCTION
   SECURITY
   APPLICATIONS
   CHALLENGES
   CONCLUSION
   REFERENCES
Cryptography is
  Art & Science of preparing coded or protected
   Communication intelligible only to the authorized
   person.
Cryptography jargon:
           ciphertext, plaintext, keys,symmetric
   &asymmetric algorithms.
History : from World War-I
Cryptology
Cryptanalysis
Cryptography:
 Codes and Code books

 Ciphers



Cryptanalysis:
  Art of analyzing ciphertext to extract the
   plaintext or the key.
Steganography:
SECURITY REQUIREMENTS:
      Confidentiality
      Integrity
      Authentication
SECURITY THREATS:
     Information disclosure
     Integrity violation
     Generic threat : trojan horses
     Authentication threats
   SECURITY MECHANISMS:
    Encryption:
                 The method of disguising plaintext
    in such a way as to hide its substance is called
    encryption.
    Decryption:
               The process of reverting ciphertext to
    its original plaintext is called decryption.
Digital Signatures:
                           Digital signatures enable the recipient of
 information to verify the authenticity of the information’s origin,
 and also verify that the information is intact. Thus, public key
 digital signatures provide authentication and data integrity.
Hash Algorithms:
                             A one-way hash function takes variable-
 length input, in this case, a message of any length, even thousands
 or millions of bits—and produces a fixed-length output; say, 160-
 bits. The hash function ensures that, if the information is changed
 in any way—even by just one bit—an entirely different output
 value is produced.
I.     Protecting ATM transactions

II.    Smart Card

III.   Cryptography Application Block

IV.    Watermarking
Advantages of ATM :
        >Easy to access
        >would not require human intervention
        >economical


Customer authentication:
        > customer’s signature
        > customer’s voiceprint
        > customer’s fingerprint
        > a password assigned to the customer
User_ID      PAN         PIN
Janu          17894567       8974
Sonu          76654321       7860




             Q2=f(Q1);
   Q2=f(Q1)=1,000,000,000 – Q1
Q2(Janu)=1,000,000,000 – 17,894,567
        =999,982,105,433
   The solution – encipherment!

                           Q2= EK{Q1}.
   If the cryptographic algorithm EK{ --- } is sufficiently strong, then knowledge of
    the pair (Q1,Q2) or even a large number of pairs ({Q1(i), Q2(i)):1< i < N} might
    not permit a customer easily to deduce the secret key K.
   A solution to permit the user to select a U-PIN((User_ID)).
    The PIN(User_ID), PINOffset(User_ID), and U-PIN(User_ID) in
    the IBM 3624 system are related by
U - PIN(User ID)= Left16[EK{PAN(User ID)}]+ PINOffset(User ID).
Standard Decimalization Table:

    0   1   2   3   4    5   6   7   8    9   A   B   C    D E     F
    0   1   2   3   4    5   6   7   8    9   0   1    2   3   4   5
   Smart card is pocket-sized card with embedded integrated circuits which
    can process data.
   The smart card will provide proof of identity when a user is
    communicating with a remote server. Secure transactions involving a
    smart card will require cryptography.

   If the identification process is based on public-key cryptography, then
   . The key will need to be stored in the EEPROM,
   . The smart card will need to read-protect the key, and
   . The owner of the card will need to use a PIN to prove identity to the
    card.
A secure cryptoprocessor is a dedicated computer or
microprocessor for carrying out cryptograpic operations,
embedded in a packaging with multiple physical security
measures, which give it a degree of tamper resistance.

Cryptoprocessors input program instructions in encrypted
form, decrypt the instructions to plain instructions which are
then executed within the same cryptoprocessor chip where the
decrypted instructions are inaccessibly stored. By never
revealing   the   decrypted     program     instructions,  the
cryptoprocessor prevents tampering of programs by technicians
who may have legitimate access to the sub-system data bus.
   Cryptography Application Block simplifies how developers incorporate
    cryptographic functionality in their applications. Applications can use the
    application block for a variety of tasks, such as encrypting information,
    creating a hash from data, and comparing hash values to verify that data
    has not been altered.
   The Cryptography Application Block was designed to achieve the
    following goals:
             Encapsulate the logic that is used to perform the most common
    application cryptography tasks.
         Present a standard consistent model for common cryptography tasks.
           Make sure minimal or negligible performance impact compared to
    manually written cryptography code that accomplishes the same
    functionality.
            Provide a key protection model that can be customized to satisfy
    your organization's security requirements.
   Watermarking is a method in computer security by which
    identifiers of sources or copyright owners of digital or analog
    signals are embedded into the respective signals themselves in
    order to keep track of where a signal comes from or who the
    copyright owners are.
   The characteristic security requirements on digital watermarking
    schemes, also called electronic copyright marking schemes (ECMS),
    are as follows:
              >unobstrusiveness: Watermarks should not degrade the
    quality of the cover-signal.
                >robustness:Watermarks should be embedded into the
    content, in such a way that any signal transform of reasonable
    strength cannot remove the watermark.
Plays role in business
         economics, e-commerce,banking etc.,
Plays role in web security
         SSL protocol
Plays role in military agencies
          National Security Agency(NSA).
Plays role in System Security
          Unix passwords, SIM cards etc.,
   In the future, as telephone networks become digital, even the actual
    conversations may be recorded and stored. All of this amounts to a great
    potential loss of privacy. Cryptography is one tool that will be able to
    ensure more privacy. The ability to encrypt data, communications, and
    other information gives individuals the power to restore personal
    privacy.

   Cryptography is important for more than just privacy, however.
    Cryptography protects the world’s banking systems as well. Many banks
    and other financial institutions conduct their business over open
    networks, such as the Internet.
   1.Microsoft Encarta Encyclopedia
   2.Cryptography Encyclopedia
   3.Cryptography and Data security by Dorothy Elizabeth,Amazon.com
   4.Computer-security and Cryptography by Alan konheim,ACM portal.
   5.Cryptography & Data security by Denning,Amazon.com
   6. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul M.G. Linnartz,
    Matthew L. Miller, C., andBrendan S. Traw (1999). “Copy protection for
    DVDvideo.” Proceedings of the IEEE,87 (7), 1267–1276.
   7.Applied Cryptography and Data security by Prof. Christof Paar
   8.www.msdn.microsft.com

Weitere ähnliche Inhalte

Was ist angesagt?

Summer report crypto
Summer report cryptoSummer report crypto
Summer report cryptoGaurav Shukla
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13ravik09783
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver04
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
04 authentication
04 authentication04 authentication
04 authenticationJadavsejal
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safeeSAT Publishing House
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS securityNilu Desai
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingSnehith
 

Was ist angesagt? (19)

Security
SecuritySecurity
Security
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
04 authentication
04 authentication04 authentication
04 authentication
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
digital signature for SMS security
digital signature for SMS securitydigital signature for SMS security
digital signature for SMS security
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
 

Andere mochten auch

Citrix Xen Server 5 5
Citrix Xen Server 5 5Citrix Xen Server 5 5
Citrix Xen Server 5 5anterope
 
5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGONTahmid Rongon
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPTpriyanka reddy
 

Andere mochten auch (7)

Ts terminal server
Ts terminal serverTs terminal server
Ts terminal server
 
Citrix Xen Server 5 5
Citrix Xen Server 5 5Citrix Xen Server 5 5
Citrix Xen Server 5 5
 
5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON5G Mobile Technology-By TAHMID RONGON
5G Mobile Technology-By TAHMID RONGON
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT5G MOBILE TECHNOLOGY PPT
5G MOBILE TECHNOLOGY PPT
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 

Ähnlich wie Cryptographysecurity 1222867498937700-9

SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONIJNSA Journal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 

Ähnlich wie Cryptographysecurity 1222867498937700-9 (20)

Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
 
Coding And Decoding
Coding And DecodingCoding And Decoding
Coding And Decoding
 
Cyber security
Cyber securityCyber security
Cyber security
 
J017667582
J017667582J017667582
J017667582
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cryptographysecurity 1222867498937700-9

  • 1. Guided by VIBJAN KOLAPATI Mrs. SHEENA MATHEW CS-B,ROLL NO:97
  • 2. INTRODUCTION  SECURITY  APPLICATIONS  CHALLENGES  CONCLUSION  REFERENCES
  • 3. Cryptography is Art & Science of preparing coded or protected Communication intelligible only to the authorized person. Cryptography jargon: ciphertext, plaintext, keys,symmetric &asymmetric algorithms. History : from World War-I Cryptology Cryptanalysis
  • 4. Cryptography:  Codes and Code books  Ciphers Cryptanalysis: Art of analyzing ciphertext to extract the plaintext or the key. Steganography:
  • 5.
  • 6. SECURITY REQUIREMENTS: Confidentiality Integrity Authentication SECURITY THREATS: Information disclosure Integrity violation Generic threat : trojan horses Authentication threats
  • 7. SECURITY MECHANISMS: Encryption: The method of disguising plaintext in such a way as to hide its substance is called encryption. Decryption: The process of reverting ciphertext to its original plaintext is called decryption.
  • 8. Digital Signatures: Digital signatures enable the recipient of information to verify the authenticity of the information’s origin, and also verify that the information is intact. Thus, public key digital signatures provide authentication and data integrity. Hash Algorithms: A one-way hash function takes variable- length input, in this case, a message of any length, even thousands or millions of bits—and produces a fixed-length output; say, 160- bits. The hash function ensures that, if the information is changed in any way—even by just one bit—an entirely different output value is produced.
  • 9. I. Protecting ATM transactions II. Smart Card III. Cryptography Application Block IV. Watermarking
  • 10. Advantages of ATM : >Easy to access >would not require human intervention >economical Customer authentication: > customer’s signature > customer’s voiceprint > customer’s fingerprint > a password assigned to the customer
  • 11. User_ID PAN PIN Janu 17894567 8974 Sonu 76654321 7860 Q2=f(Q1); Q2=f(Q1)=1,000,000,000 – Q1 Q2(Janu)=1,000,000,000 – 17,894,567 =999,982,105,433
  • 12. The solution – encipherment! Q2= EK{Q1}.  If the cryptographic algorithm EK{ --- } is sufficiently strong, then knowledge of the pair (Q1,Q2) or even a large number of pairs ({Q1(i), Q2(i)):1< i < N} might not permit a customer easily to deduce the secret key K.  A solution to permit the user to select a U-PIN((User_ID)). The PIN(User_ID), PINOffset(User_ID), and U-PIN(User_ID) in the IBM 3624 system are related by U - PIN(User ID)= Left16[EK{PAN(User ID)}]+ PINOffset(User ID). Standard Decimalization Table: 0 1 2 3 4 5 6 7 8 9 A B C D E F 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
  • 13. Smart card is pocket-sized card with embedded integrated circuits which can process data.  The smart card will provide proof of identity when a user is communicating with a remote server. Secure transactions involving a smart card will require cryptography.  If the identification process is based on public-key cryptography, then  . The key will need to be stored in the EEPROM,  . The smart card will need to read-protect the key, and  . The owner of the card will need to use a PIN to prove identity to the card.
  • 14.
  • 15. A secure cryptoprocessor is a dedicated computer or microprocessor for carrying out cryptograpic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Cryptoprocessors input program instructions in encrypted form, decrypt the instructions to plain instructions which are then executed within the same cryptoprocessor chip where the decrypted instructions are inaccessibly stored. By never revealing the decrypted program instructions, the cryptoprocessor prevents tampering of programs by technicians who may have legitimate access to the sub-system data bus.
  • 16. Cryptography Application Block simplifies how developers incorporate cryptographic functionality in their applications. Applications can use the application block for a variety of tasks, such as encrypting information, creating a hash from data, and comparing hash values to verify that data has not been altered.  The Cryptography Application Block was designed to achieve the following goals: Encapsulate the logic that is used to perform the most common application cryptography tasks. Present a standard consistent model for common cryptography tasks. Make sure minimal or negligible performance impact compared to manually written cryptography code that accomplishes the same functionality. Provide a key protection model that can be customized to satisfy your organization's security requirements.
  • 17.
  • 18. Watermarking is a method in computer security by which identifiers of sources or copyright owners of digital or analog signals are embedded into the respective signals themselves in order to keep track of where a signal comes from or who the copyright owners are.  The characteristic security requirements on digital watermarking schemes, also called electronic copyright marking schemes (ECMS), are as follows: >unobstrusiveness: Watermarks should not degrade the quality of the cover-signal. >robustness:Watermarks should be embedded into the content, in such a way that any signal transform of reasonable strength cannot remove the watermark.
  • 19. Plays role in business economics, e-commerce,banking etc., Plays role in web security SSL protocol Plays role in military agencies National Security Agency(NSA). Plays role in System Security Unix passwords, SIM cards etc.,
  • 20. In the future, as telephone networks become digital, even the actual conversations may be recorded and stored. All of this amounts to a great potential loss of privacy. Cryptography is one tool that will be able to ensure more privacy. The ability to encrypt data, communications, and other information gives individuals the power to restore personal privacy.  Cryptography is important for more than just privacy, however. Cryptography protects the world’s banking systems as well. Many banks and other financial institutions conduct their business over open networks, such as the Internet.
  • 21. 1.Microsoft Encarta Encyclopedia  2.Cryptography Encyclopedia  3.Cryptography and Data security by Dorothy Elizabeth,Amazon.com  4.Computer-security and Cryptography by Alan konheim,ACM portal.  5.Cryptography & Data security by Denning,Amazon.com  6. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul M.G. Linnartz, Matthew L. Miller, C., andBrendan S. Traw (1999). “Copy protection for DVDvideo.” Proceedings of the IEEE,87 (7), 1267–1276.  7.Applied Cryptography and Data security by Prof. Christof Paar  8.www.msdn.microsft.com