Cryptography
Upcoming SlideShare
Loading in...5
×
 

Cryptography

on

  • 2,076 views

This Slide is Best suited for event such as Technical Paper Presentation

This Slide is Best suited for event such as Technical Paper Presentation

Statistics

Views

Total Views
2,076
Views on SlideShare
2,076
Embed Views
0

Actions

Likes
0
Downloads
109
Comments
1

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • i cnt download this presentation how can i do????????
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cryptography Cryptography Presentation Transcript

  • Nakshatra ‘10
    “CRYPTOGRAPHY
    Unlocked”
  • TECHNICAL PAPER PRESENTATION
    INTRODUCTION
    • By Definition Cryptography Is The Process Of Converting Recognizable Data Into An Encrypted Code For Transmitting It Over A Network (Either Trusted Or Untrusted).
    • Data Is Encrypted At The Source, I.E. Sender's End And Decrypted At The Destination, I.E. Receiver's End.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    THE PURPOSE
    • Authentication
    • Privacy/confidentiality
    • Integrity
    • Non-repudiation
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    In General Cryptographic Algorithms Are Classified Into Three Categories As Follows :
    • Secret Key Cryptography (SKC)
    • Public Key Cryptography (PKC)
    • Hash Functions
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    SECRET KEY
    CRYPTOGRAPHY
    • Data Encryption Standard (DES)
    • Advanced Encryption Standard (AES )
    • International Data Encryption Algorithm (IDEA)
    • Rivest Ciphers
    • Blowfish
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    PUBLIC - KEY
    CRYPTOGRAPHY
    • In PKC, one of the keys is designated the public key and may be advertised as widely as the owner wants. The other key is designated the private key and is never revealed to another party.
    RSA
    • One of the most popular encryption algorithm, invented in 1977 by three MIT scientists (Ronald Rivest, Adi Shamir, and Leonard Adleman)
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    Hash Functions
    • Message Digest (MD) algorithms
    MD2 : Designed for systems with limited memory, such as smart cards.
    MD4 : Developed by Rivest, similar to MD2 but designed specifically for fast processing in software.
    MD5 : It accepts variable length message from the user and converts it into a fixed 128-bit message digest value.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    • Secure Hash Algorithm (SHA)
    Algorithm for nist's secure hash standard (SHS). SHA-1 produces a 160-bit hash value and was originally published as FIPS 180-1 and RFC 3174. FIPS 180-2 describes five algorithms in the SHS: SHA-1 plus SHA-224, SHA-256, SHA-384, and SHA-512 which can produce hash values that are 224, 256, 384, or 512 bits in length, respectively. SHA-224, -256, -384, and -52 are also described in RFC 4634.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    • RIPEMD
    A series of message digests that initially came from the RIPE (RACE integrity primitives evaluation) project. RIPEMD-160 was designed by Hans Dobbertin, AntoonBosselaers, And Bart Preneel, and optimized for 32-bit processors to replace the then-current 128-bit hash functions. Other versions include RIPEMD-256, RIPEMD-320, and RIPEMD-128.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    • HAVAL (HAsh of VAriable Length)
    Designed by Y. Zheng, J. Pieprzyk and J. Seberry, a hash algorithm with many levels of security. HAVAL can create hash values that are 128, 160, 192, 224, or 256 bits in length.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    • WHIRLPOOL
    A relatively new hash function, designed by V. Rijmen and P.S.L.M. Barreto. Whirlpool operates on messages less than 2256 bits in length, and produces A message digest of 512 bits. The design of this hash function is very different than that of MD5 and SHA-1, making it immune to the same attacks as on those hashes.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    • TIGER
    Designed by Ross Anderson and Eli Biham, Tiger is designed to be secure, run efficiently on 64-bit processors, and easily replace MD4, MD5, SHA and SHA-1 in other applications. Tiger/192 produces a 192-bit output and is compatible with 64-bit architectures; Tiger/128 and Tiger/160 produce the first 128 and 160 bits, respectively, to provide compatibility with the other hash functions.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    CONCLUSION
    • In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful.
    • In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared key known only between the two communicating hosts.
    • This shared key is used both for the encryption as well as the decryption of data.
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    REFERENCE
    INTERNET SOURCE :
    www.wiki.org
    www.insecure.com
    BOOK SOURCE :
    Computer Security (Tech – Max Publication)
    Nakshatra ‘10
  • TECHNICAL PAPER PRESENTATION
    QUESTION & ANSWER
    THANK YOU
    Nakshatra ‘10