SlideShare a Scribd company logo
1 of 40
Download to read offline
THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA SUBMITTED BY: PARUL MEHRA NRO0192077 INFORMATION TECHNOLOGY TRAINING SUBMITTED TO: MR. ROHIT SHARMA MR. SATISH KUMAR ITT CENTRE AMRITSAR
A PROJECT REPORT ON CRYPTOGRAPHY
Cryptography
What is Cryptography? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Brief History of Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
Crypto Terms ,[object Object],[object Object],[object Object],[object Object]
Cryptography Broken Down ,[object Object],[object Object],[object Object],[object Object],[object Object]
Symmetric Cryptosystem   ,[object Object],[object Object],[object Object],[object Object]
Symmetric Cryptosystem
Symmetric Challenge ,[object Object],[object Object],[object Object],[object Object]
Key Management ,[object Object],[object Object],[object Object]
Introduction of the Public Key   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure
Idea behind Public Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptanalysis Terms ,[object Object],[object Object],[object Object]
Crypto System Properties ,[object Object],[object Object],[object Object]
Secrecy Requirements ,[object Object],[object Object]
Authenticity   Requirements   ,[object Object],[object Object]
Digital Encryption Standard(DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications of DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do We Encrypt? ,[object Object],[object Object],Symmetric  encryption:  decryption is the same cryptovariable ciphertext plaintext protocol
How could we break this? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Substitution Cipher ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Perfect Cryptosystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enigma Machine  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Enigma Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Modern Symmetric Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key   Distribution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Paradigm Shift ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A, B agree on information Y A computes A(Y) Mails it to B B computes B(Y) Mails it to A Alcomputes A(B(Y)) B computes B(A(Y)) A(B(Y)) = B(A(Y)) = secret key “ E” knows Y, A(Y), B(Y), but can’t compute key Problem:  how do you make A(B(Y)) = B(A(Y))?
Diffie-Hellman-Merkle (1976) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One-way Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptographic Primitives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trapdoor One-Way Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature Process
Revolution ,[object Object],[object Object],[object Object],[object Object]
Quantum Computation ,[object Object],[object Object],[object Object],[object Object]
THANK YOU

More Related Content

What's hot

Introduction to Tally Prime.pptx
Introduction to Tally Prime.pptxIntroduction to Tally Prime.pptx
Introduction to Tally Prime.pptxArunChauhan18
 
What is Cryptocurrencies? Impact on World Economy & Indian Economy
What is Cryptocurrencies? Impact on World Economy & Indian EconomyWhat is Cryptocurrencies? Impact on World Economy & Indian Economy
What is Cryptocurrencies? Impact on World Economy & Indian Economyhritviksoni2
 
India toards cashless economy
India toards cashless economyIndia toards cashless economy
India toards cashless economyShahab Khan
 
Cryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesCryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesMBA Student
 
Presentation on cryptocurrency
Presentation on cryptocurrencyPresentation on cryptocurrency
Presentation on cryptocurrencyDhruv Gandhi
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencySameer Satyam
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION jaldumanohar manohar
 
Future of crypto currency in india
Future of crypto currency in indiaFuture of crypto currency in india
Future of crypto currency in indiaamit saini
 
Cashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to followCashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to followAbhinav Reddy Lattu
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
ITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAUR
ITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAURITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAUR
ITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAURPranveet Kaur
 
Cashless Economy- Advantages & Challenges
Cashless Economy- Advantages & Challenges Cashless Economy- Advantages & Challenges
Cashless Economy- Advantages & Challenges Akanksha Shukla
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Towards cashless economy
Towards cashless economyTowards cashless economy
Towards cashless economyJithin Parakka
 

What's hot (20)

Cryptocurrency
Cryptocurrency Cryptocurrency
Cryptocurrency
 
Introduction to Tally Prime.pptx
Introduction to Tally Prime.pptxIntroduction to Tally Prime.pptx
Introduction to Tally Prime.pptx
 
What is Cryptocurrencies? Impact on World Economy & Indian Economy
What is Cryptocurrencies? Impact on World Economy & Indian EconomyWhat is Cryptocurrencies? Impact on World Economy & Indian Economy
What is Cryptocurrencies? Impact on World Economy & Indian Economy
 
India toards cashless economy
India toards cashless economyIndia toards cashless economy
India toards cashless economy
 
Cryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesCryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantages
 
Presentation on cryptocurrency
Presentation on cryptocurrencyPresentation on cryptocurrency
Presentation on cryptocurrency
 
Cashless India
Cashless IndiaCashless India
Cashless India
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital Currency
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
Future of crypto currency in india
Future of crypto currency in indiaFuture of crypto currency in india
Future of crypto currency in india
 
Cashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to followCashless economy - Presentation of Cashless economy methods to follow
Cashless economy - Presentation of Cashless economy methods to follow
 
BITCOIN- A Presentation.
BITCOIN- A Presentation.BITCOIN- A Presentation.
BITCOIN- A Presentation.
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
ITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAUR
ITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAURITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAUR
ITT TRAINING PROJECT.... Topic - Distance Learning System By PRANVEET KAUR
 
Cashless Economy- Advantages & Challenges
Cashless Economy- Advantages & Challenges Cashless Economy- Advantages & Challenges
Cashless Economy- Advantages & Challenges
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Towards cashless economy
Towards cashless economyTowards cashless economy
Towards cashless economy
 
UPI Presentation.pptx
UPI Presentation.pptxUPI Presentation.pptx
UPI Presentation.pptx
 
Paytm presentation
Paytm presentationPaytm presentation
Paytm presentation
 

Viewers also liked

Ca itt training question 1500+
Ca itt training question 1500+Ca itt training question 1500+
Ca itt training question 1500+Devendra Kachhi
 
Microsoft Excel Project 1 Presentation
Microsoft Excel Project 1 PresentationMicrosoft Excel Project 1 Presentation
Microsoft Excel Project 1 Presentationjmartinvvc
 
MS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMridul Bansal
 
ITT project ON types of operating system
ITT project ON types of operating systemITT project ON types of operating system
ITT project ON types of operating systemJiohj Etzs
 
MS-EXCEL Assignment Help
MS-EXCEL Assignment HelpMS-EXCEL Assignment Help
MS-EXCEL Assignment HelpRahul Kataria
 
Teaching Excel
Teaching ExcelTeaching Excel
Teaching Excelsam ran
 
Microsoft word presentation
Microsoft word presentationMicrosoft word presentation
Microsoft word presentationegirshovich
 
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)Nikhil Dhawan
 
GST Power Point Presentation
GST Power Point PresentationGST Power Point Presentation
GST Power Point Presentationpraveendel
 
Functions and formulas of ms excel
Functions and formulas of ms excelFunctions and formulas of ms excel
Functions and formulas of ms excelmadhuparna bhowmik
 
Excel presentation data validation
Excel presentation   data validationExcel presentation   data validation
Excel presentation data validationNagamani Y R
 
Access presentation
Access presentationAccess presentation
Access presentationDUSPviz
 
Tally assingment book
Tally assingment bookTally assingment book
Tally assingment bookbatle18
 
Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids Queens Library
 
Ms Access ppt
Ms Access pptMs Access ppt
Ms Access pptanuj
 

Viewers also liked (20)

Ca itt training question 1500+
Ca itt training question 1500+Ca itt training question 1500+
Ca itt training question 1500+
 
Microsoft Excel Project 1 Presentation
Microsoft Excel Project 1 PresentationMicrosoft Excel Project 1 Presentation
Microsoft Excel Project 1 Presentation
 
MS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATION
 
Itt presentationn
Itt presentationnItt presentationn
Itt presentationn
 
ITT project ON types of operating system
ITT project ON types of operating systemITT project ON types of operating system
ITT project ON types of operating system
 
MS-EXCEL Assignment Help
MS-EXCEL Assignment HelpMS-EXCEL Assignment Help
MS-EXCEL Assignment Help
 
Teaching Excel
Teaching ExcelTeaching Excel
Teaching Excel
 
Tally ERP in ITT
Tally ERP in ITTTally ERP in ITT
Tally ERP in ITT
 
Tally project
Tally projectTally project
Tally project
 
Microsoft word presentation
Microsoft word presentationMicrosoft word presentation
Microsoft word presentation
 
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
Project Report on Computer (Basics, MS Word, MS Powerpoint, Email)
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
GST Power Point Presentation
GST Power Point PresentationGST Power Point Presentation
GST Power Point Presentation
 
Ppt on ms excel
Ppt on ms excelPpt on ms excel
Ppt on ms excel
 
Functions and formulas of ms excel
Functions and formulas of ms excelFunctions and formulas of ms excel
Functions and formulas of ms excel
 
Excel presentation data validation
Excel presentation   data validationExcel presentation   data validation
Excel presentation data validation
 
Access presentation
Access presentationAccess presentation
Access presentation
 
Tally assingment book
Tally assingment bookTally assingment book
Tally assingment book
 
Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids Intro to Microsoft Word 2010 for Kids
Intro to Microsoft Word 2010 for Kids
 
Ms Access ppt
Ms Access pptMs Access ppt
Ms Access ppt
 

Similar to Itt project

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxImXaib
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptnavidkamrava
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryptionphanleson
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptographyPriyamvada Singh
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System SecurityShu Shin
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 

Similar to Itt project (20)

Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
amer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.pptamer-network-sihubconferances-security.ppt
amer-network-sihubconferances-security.ppt
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
introduction to cryptography
introduction to cryptographyintroduction to cryptography
introduction to cryptography
 
crypto1.ppt
crypto1.pptcrypto1.ppt
crypto1.ppt
 
needed.ppt
needed.pptneeded.ppt
needed.ppt
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

Recently uploaded

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 

Recently uploaded (20)

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 

Itt project

  • 1. THE INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA SUBMITTED BY: PARUL MEHRA NRO0192077 INFORMATION TECHNOLOGY TRAINING SUBMITTED TO: MR. ROHIT SHARMA MR. SATISH KUMAR ITT CENTRE AMRITSAR
  • 2. A PROJECT REPORT ON CRYPTOGRAPHY
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. A, B agree on information Y A computes A(Y) Mails it to B B computes B(Y) Mails it to A Alcomputes A(B(Y)) B computes B(A(Y)) A(B(Y)) = B(A(Y)) = secret key “ E” knows Y, A(Y), B(Y), but can’t compute key Problem: how do you make A(B(Y)) = B(A(Y))?
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 38.
  • 39.

Editor's Notes

  1. Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans.
  2. There are two kinds of cryptosystems: symmetric and asymmetric . Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Asymmetric cryptosystems are also called public key cryptosystems.
  3. In traditional cryptography, the sender and receiver of a message know and use the same secret key; the sender uses the secret key to encrypt the message, and the receiver uses the same secret key to decrypt the message. This method is known as secret key or symmetric cryptography
  4. The main challenge is getting the sender and receiver to agree on the secret key without anyone else finding out. If they are in separate physical locations, they must trust a courier, a phone system, or some other transmission medium to prevent the disclosure of the secret key. Anyone who overhears or intercepts the key in transit can later read, modify, and forge all messages encrypted or authenticated using that key.
  5. The generation, transmission and storage of keys is called key management ; all cryptosystems must deal with key management issues. Because all keys in a secret-key cryptosystem must remain secret, secret-key cryptography often has difficulty providing secure key management, especially in open systems with a large number of users.
  6. In order to solve the key management problem, Whitfield Diffie and Martin Hellman introduced the concept of public-key cryptography in 1976. Public-key cryptosystems have two primary uses, encryption and digital signatures. In their system, each person gets a pair of keys, one called the public key and the other called the private key. The public key is published, while the private key is kept secret. The need for the sender and receiver to share secret information is eliminated; all communications involve only public keys, and no private key is ever transmitted or shared. In this system, it is no longer necessary to trust the security of some means of communications. The only requirement is that public keys be associated with their users in a trusted (authenticated) manner (for instance, in a trusted directory). Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient.