Your SlideShare is downloading.
×

×
# Introducing the official SlideShare app

### Stunning, full-screen experience for iPhone and Android

#### Text the download link to your phone

Standard text messaging rates apply

Like this presentation? Why not share!

- cryptography by Abhijeet Singh 1879 views
- Cryptography by herrberk 1350 views
- Cryptography by TechKnowXpress 4059 views
- Cryptography.ppt by kusum sharma 22159 views
- Cryptography by Shivanand Arur 23463 views
- Cryptography by gueste4c97e 4818 views
- Cryptography by research30 5939 views
- Cryptography by Jasim Jas 3070 views
- Cryptography Intro by shadyproject 5931 views
- Cryptography by Sidharth Mohapatra 5098 views
- Asif by mohdasifansari 1933 views
- What is Cryptography? by Pratik Poddar 3998 views

Like this? Share it with your network
Share

618

views

views

Published on

Published in:
Business

No Downloads

Total Views

618

On Slideshare

0

From Embeds

0

Number of Embeds

1

Shares

0

Downloads

74

Comments

0

Likes

1

No embeds

No notes for slide

- 1. PRESENTED BY: JATIN KAKKAR -26 JESO P . JAMES - 28
- 2. • INTODUCTION• HISTORY• OBEJECTIVE & OVERVIEW• APPLICATIONS• CRYPTOGRAPHY COMPONENTS• TERMINOLOGY• ASPECTS• TYPES OF CRYPTOGRAPHY• ADVANTAGES• CONCLUSION• REFERENCES
- 3. • Cryptography is the science of information security.• The word is derived from the Greek kryptos, meaning hidden.• Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.
- 4. • Confidentiality:- the information cannot be understood by anyone for whom it was unintended.• Integrity :-the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.• Authentication :-the sender and receiver can confirm each others identity and the origin/destination of the information.
- 5. Overview of Cryptography & Its Applications• People wants and needs privacy and security while communicating.• In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies (adversaries).• Nowadays, with the technologic progress as our dependency on electronic systems has increased we need more sophisticated techniques.• Cryptography provides most of the methods and techniques for a secure communication
- 6. Cryptography components 6
- 7. • Encryption – It is a process of changing or converting normal text or data information into gibberish text.• Decryption – It is a process of changing or converting gibberish text back to correct message or data by using encryption method.
- 8. TerminologyCryptology : All-inclusive term used for the study of securecommunication over non-secure channels.Cryptography : The process of designing systems to realizesecure communications over non-secure channels.Cryptoanalysis : The discipline of breaking the cryptographicsystems.Coding Theory : Deals with representing the informationusing codes. It covers compression, secrecy, anderror correction.
- 9. The Aspects of Cryptography• Modern cryptography heavily depends on mathematics and the usage of digital systems.• It is a inter-disciplinary study of basically three fields: Mathematics Computer Science Electrical Engineering• Without having a complete understanding of crypto analysis (or cryptoanalytic techniques) it is impossible to design good (secure, unbreakable) cryptographic systems.• It makes use of other disciplines such as error-correcting codes compression.
- 10. Categories of cryptography 10
- 11. • A single common encryption key is used to encode and decode messages.• Both sender and receiver must know the common key.• The common key need to be exchanged before hand by some other secure method.• Symmetric encryption is simple and fast.• But - key management is impractical with large number of senders and receivers. 11
- 12. Symmetric-key cryptography 11
- 13. Asymmetric-key cryptography• Asymmetric system under, which two different keys are used to encrypt and decrypt the message or received data packet.• On public key is used to encrypt the data or message and the private key on receiving end is used to decrypt the message or data packet.• Each user has a Public key and a corresponding Private (secret) key 12
- 14. Asymmetric-key cryptography
- 15. Keys used in cryptography
- 16. • Sender”sign” messages by means of his private secret key.• Recipient verify the senders signature by means of the senders public key.• The senders identity is certified by means of a”Certificate” which is digitally signed by a trusted third party.
- 17. • public-key cryptography Increased security and convenience.• public-key cryptography is best suited for an open multi-user environment.• Symmetric encryption is simple and fast.
- 18. • cryptography = physics + Information theory• Information is physical.• Information gain implies disturbances.

Be the first to comment