SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Cryptography Made by:- Shray Jali
Cryptography ,[object Object]
Formed from the Greek words kryptós, "hidden", and logos, "word".
Cryptography is a framework of methodologies used to ensure the CIA triad for our information C –Confidentiality  I –Integrity  A -Authenticity ,[object Object]
It could be implemented manually, mechanically or even electronically ,[object Object]
If we are using symmetric encryption, then we will encrypt the clear message with one key and decrypt it with the same key,[object Object]
We need to define a way by which we can exchange these private keys in a secure manner between distant entities
DES, 3DES, Blowfish, IDEA, RC5, Safer, Serpent and AES are the well known symmetric encryption algorithms,[object Object],[object Object]
RSA is the famous asymmetric key encryption algorithm,[object Object]
Early Cryptography 500- 600 BC 486 BC: Greece 60 –50 BC: JuliusCaesar Substitution cipher Used by Hebrew Shift letters by X positions  E.g. X = 3: A -> D, B -> E,  C ->F, ..
Medieval Cryptography 1845: Morse code 1918: The ENIGMA ,[object Object]
“Scrambler”,[object Object],[object Object]
modern Cryptography 1976: Diffie-Hellman Key Exchange Private key: This key must be know only by its owner. Public key: This key is known to everyone
modern Cryptography 1977: RSA: Rivest, Shamir & Adleman Algorithm ,[object Object]
Variable Key Size (512, 1024, or 2048 bits)
Most popular public key algorithm,[object Object]
Uses a block cipher called IDEA
Uses Digital Signatures
Uses Web Trust
E.g. X.509 certificates in SSL ,[object Object]
Encryption works by means of key and Decryption is the reverse of encryption process using the same keyThe Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs which are used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access Stream Ciphers ,[object Object]
Suitable for online encryption of data, e.g. Encrypting Voice Comms
Much faster than block ciphers for online work,[object Object]
Encryption operates on plaintext using the encryption key and the modulus to produce cipher text

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cryptography
CryptographyCryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
cryptography
cryptographycryptography
cryptography
 

Andere mochten auch

Reading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & GauguinReading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & GauguinAzmiSuhaimi
 
Manuale sicurnet visite mediche
Manuale sicurnet visite medicheManuale sicurnet visite mediche
Manuale sicurnet visite medicheportale consulenti
 
Planos Proyecto Tiovivo PresentacióN2 (1 )
Planos Proyecto Tiovivo PresentacióN2  (1 )Planos Proyecto Tiovivo PresentacióN2  (1 )
Planos Proyecto Tiovivo PresentacióN2 (1 )margarita mayoral
 
Presentacinccparaudelarcorregidaal proeva2013
Presentacinccparaudelarcorregidaal proeva2013Presentacinccparaudelarcorregidaal proeva2013
Presentacinccparaudelarcorregidaal proeva2013Patricia Díaz Charquero
 
eFront Commercial Editions Overview
eFront Commercial Editions OvervieweFront Commercial Editions Overview
eFront Commercial Editions Overviewpapagel
 
Tanja and Asgeir
Tanja and AsgeirTanja and Asgeir
Tanja and AsgeirSigne Sloth
 
Cd howe can-us_housing_market_commentary
Cd howe can-us_housing_market_commentaryCd howe can-us_housing_market_commentary
Cd howe can-us_housing_market_commentaryVahab Jalali
 
Google drive -_manual_avanzado (1)
Google drive -_manual_avanzado (1)Google drive -_manual_avanzado (1)
Google drive -_manual_avanzado (1)Migue Sosa
 
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn BoogaardFlex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn BoogaardEsri Nederland
 
Alex Wheatley Visual Resume
Alex Wheatley Visual ResumeAlex Wheatley Visual Resume
Alex Wheatley Visual ResumeAlex Wheatley
 
3 - Come usare Storyline con Docebo: creare un Quiz
3 - Come usare Storyline con Docebo: creare un Quiz3 - Come usare Storyline con Docebo: creare un Quiz
3 - Come usare Storyline con Docebo: creare un QuizDoceboElearningITA
 
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektistEesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektistEne-Silvia Sarv
 

Andere mochten auch (20)

Reading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & GauguinReading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & Gauguin
 
Apply Design Thinking LA
Apply Design Thinking LAApply Design Thinking LA
Apply Design Thinking LA
 
Manuale sicurnet visite mediche
Manuale sicurnet visite medicheManuale sicurnet visite mediche
Manuale sicurnet visite mediche
 
Planos Proyecto Tiovivo PresentacióN2 (1 )
Planos Proyecto Tiovivo PresentacióN2  (1 )Planos Proyecto Tiovivo PresentacióN2  (1 )
Planos Proyecto Tiovivo PresentacióN2 (1 )
 
Presentacinccparaudelarcorregidaal proeva2013
Presentacinccparaudelarcorregidaal proeva2013Presentacinccparaudelarcorregidaal proeva2013
Presentacinccparaudelarcorregidaal proeva2013
 
Greetings
GreetingsGreetings
Greetings
 
eFront Commercial Editions Overview
eFront Commercial Editions OvervieweFront Commercial Editions Overview
eFront Commercial Editions Overview
 
Tanja and Asgeir
Tanja and AsgeirTanja and Asgeir
Tanja and Asgeir
 
Cd howe can-us_housing_market_commentary
Cd howe can-us_housing_market_commentaryCd howe can-us_housing_market_commentary
Cd howe can-us_housing_market_commentary
 
Floorplans
FloorplansFloorplans
Floorplans
 
Wikipedia
WikipediaWikipedia
Wikipedia
 
Calificador
CalificadorCalificador
Calificador
 
E learning
E learningE learning
E learning
 
Google drive -_manual_avanzado (1)
Google drive -_manual_avanzado (1)Google drive -_manual_avanzado (1)
Google drive -_manual_avanzado (1)
 
лекция 19
лекция 19лекция 19
лекция 19
 
Kinder
KinderKinder
Kinder
 
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn BoogaardFlex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
 
Alex Wheatley Visual Resume
Alex Wheatley Visual ResumeAlex Wheatley Visual Resume
Alex Wheatley Visual Resume
 
3 - Come usare Storyline con Docebo: creare un Quiz
3 - Come usare Storyline con Docebo: creare un Quiz3 - Come usare Storyline con Docebo: creare un Quiz
3 - Come usare Storyline con Docebo: creare un Quiz
 
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektistEesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
 

Ähnlich wie Cryptography

Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of CryptographyManjarul Hoque
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singhGaurav Singh
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxdesalewminale
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Phan Minh
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 

Ähnlich wie Cryptography (20)

Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Crypt
CryptCrypt
Crypt
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Is case study
Is   case studyIs   case study
Is case study
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 

Mehr von Shray Jali

Larsen & toubro
Larsen & toubroLarsen & toubro
Larsen & toubroShray Jali
 
Havells india ltd
Havells india ltdHavells india ltd
Havells india ltdShray Jali
 
Marutisuzuki ERP
Marutisuzuki ERPMarutisuzuki ERP
Marutisuzuki ERPShray Jali
 
Havells India Ltd
Havells India LtdHavells India Ltd
Havells India LtdShray Jali
 
CRM practices in Dell Inc.
CRM practices in Dell Inc.CRM practices in Dell Inc.
CRM practices in Dell Inc.Shray Jali
 
Implications Of Wto On India
Implications Of Wto On IndiaImplications Of Wto On India
Implications Of Wto On IndiaShray Jali
 
AOL Goes Far East
AOL Goes Far EastAOL Goes Far East
AOL Goes Far EastShray Jali
 
Maruti Suzuki Oracle Erp
Maruti Suzuki Oracle ErpMaruti Suzuki Oracle Erp
Maruti Suzuki Oracle ErpShray Jali
 
Indian Textile Industry and its relations with EU
Indian Textile Industry and its relations with EUIndian Textile Industry and its relations with EU
Indian Textile Industry and its relations with EUShray Jali
 
Apollo Hospitals
Apollo HospitalsApollo Hospitals
Apollo HospitalsShray Jali
 
Clinical Data Management
Clinical Data ManagementClinical Data Management
Clinical Data ManagementShray Jali
 
Culture Of France
Culture Of FranceCulture Of France
Culture Of FranceShray Jali
 
Motivation Std Chartered
Motivation Std CharteredMotivation Std Chartered
Motivation Std CharteredShray Jali
 
Sir Richard Branson
Sir Richard BransonSir Richard Branson
Sir Richard BransonShray Jali
 
Global Software Solutions
Global Software SolutionsGlobal Software Solutions
Global Software SolutionsShray Jali
 

Mehr von Shray Jali (19)

Larsen & toubro
Larsen & toubroLarsen & toubro
Larsen & toubro
 
Havells india ltd
Havells india ltdHavells india ltd
Havells india ltd
 
Marutisuzuki ERP
Marutisuzuki ERPMarutisuzuki ERP
Marutisuzuki ERP
 
Dell CRM
Dell CRMDell CRM
Dell CRM
 
Havells India Ltd
Havells India LtdHavells India Ltd
Havells India Ltd
 
CRM practices in Dell Inc.
CRM practices in Dell Inc.CRM practices in Dell Inc.
CRM practices in Dell Inc.
 
Implications Of Wto On India
Implications Of Wto On IndiaImplications Of Wto On India
Implications Of Wto On India
 
AOL Goes Far East
AOL Goes Far EastAOL Goes Far East
AOL Goes Far East
 
Maruti Suzuki Oracle Erp
Maruti Suzuki Oracle ErpMaruti Suzuki Oracle Erp
Maruti Suzuki Oracle Erp
 
Indian Textile Industry and its relations with EU
Indian Textile Industry and its relations with EUIndian Textile Industry and its relations with EU
Indian Textile Industry and its relations with EU
 
Apollo Hospitals
Apollo HospitalsApollo Hospitals
Apollo Hospitals
 
Wpi
WpiWpi
Wpi
 
Clinical Data Management
Clinical Data ManagementClinical Data Management
Clinical Data Management
 
Culture Of France
Culture Of FranceCulture Of France
Culture Of France
 
Edouard Manet
Edouard ManetEdouard Manet
Edouard Manet
 
Motivation Std Chartered
Motivation Std CharteredMotivation Std Chartered
Motivation Std Chartered
 
Sir Richard Branson
Sir Richard BransonSir Richard Branson
Sir Richard Branson
 
Global Software Solutions
Global Software SolutionsGlobal Software Solutions
Global Software Solutions
 
Attrition
AttritionAttrition
Attrition
 

Cryptography