Your SlideShare is downloading.
×

×
# Saving this for later?

### Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

#### Text the download link to your phone

Standard text messaging rates apply

Like this presentation? Why not share!

- Overview of cryptography by Roshan Chaudhary 31 views
- The Cryptography has YOU by Yurii Bilyk 22 views
- Cryptography by Shivanand Arur 25254 views
- Cryptography.ppt by kusum sharma 25061 views
- Do conditional and unconditional co... by Alexander Decker 698 views
- Notions For Public Key Encryptions by techdude 560 views
- Digital signature how to use it by Elda96 168 views
- Cipher block modes by Joshua Thijssen 2532 views
- Public private key by StudsPlanet.com 283 views
- Public Key Encryption by techdude 876 views
- Lecture 3b public key_encryption by rajakhurram 532 views
- Block Cipher Modes of Operation And... by Vittorio Giovara 5813 views

Like this? Share it with your network
Share

2,043

views

views

Published on

cryptography presentation.... of u need source file mail me at nastypradeep@gmail.com.. call me +919962313702

cryptography presentation.... of u need source file mail me at nastypradeep@gmail.com.. call me +919962313702

No Downloads

Total Views

2,043

On Slideshare

0

From Embeds

0

Number of Embeds

1

Shares

0

Downloads

0

Comments

0

Likes

4

No embeds

No notes for slide

- 1. Cryptography ByNastypradeep@gmail.com Pradeep…
- 2. Nastypradeep@gmail.com
- 3. ₰ The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. ₰ Cryptanalysis is the study of how to crack encryption algorithms or their implementations.Nastypradeep@gmail.com
- 4. Nastypradeep@gmail.com
- 5. Why do we need Cryptography Security often require that data be kept safe fromunauthorized access. This problem can be broken down into fiverequirements that must be addressed:※ Confidentiality: assuring that private data remains private.※ Authentication: assuring the identity of all parties attemptingaccess.※ Authorization: assuring that a certain party attempting toperform a function has the permissions to do so.※ Data Integrity: assuring that an object is not altered illegally.※ Non-Repudiation: assuring against a party denying a data or acommunication that was initiated by them.Nastypradeep@gmail.com
- 6. Basic Concept of CryptographyNastypradeep@gmail.com
- 7. Major CategoriesClassic cryptography Classic cryptography details cryptography styles used in theolden age. It includes simple methods which was used superiorly duringwar times etc. this was before the invention of computers.modern cryptography The development of digital computers and electronics afterWWII made possible much more complex ciphers. Furthermore,computers allowed for the encryption of any kind of data representablein any binary format, unlike classical ciphers which only encryptedwritten language texts; this was new and significant. This was thebeginning of computer age.Nastypradeep@gmail.com
- 8. Classic Cryptography (Crypting techniques of olden age)Nastypradeep@gmail.com
- 9. The main classical cipher types are Transposition ciphers Substitution ciphersNastypradeep@gmail.com
- 10. Transposition ciphers Transposition ciphers are rearranging the order of letters in a message . • e.g., hello world becomes ehlol owrdl in a trivially simple rearrangement schemeNastypradeep@gmail.com
- 11. Substitution ciphers Substitution ciphers, which systematically replace letters or groups of letters with other letters or groups. e.g., ‘Fly at once becomes gmz bu podf by replacing each letter with the one following it in the Latin alphabet.Nastypradeep@gmail.com
- 12. Nastypradeep@gmail.com
- 13. The development of digital computers and electronics after WWII made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. Computer use has thus supplanted linguisticcryptography, both for cipher design andcryptanalysis. Many computer ciphers can becharacterized by their operationon binary bit sequences (sometimes in groups orblocks), unlike classical and mechanical schemes,which generally manipulate traditional characters(i.e., letters and digits) directly.Nastypradeep@gmail.com
- 14. The main Modern cipher types are Symmetric-key cryptography Public-key cryptographyNastypradeep@gmail.com
- 15. Symmetric-key cryptography ₰ Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key. ₰ Symmetric-key cryptosystems use the same key for encryption and decryption of a message, though a message or group of messages may have a different key than others. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Nastypradeep@gmail.com
- 16. Public-key cryptography Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key. A public key system is so constructed that calculation of one key (the private key) is computationally infeasible from the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair.Nastypradeep@gmail.com
- 17. CryptanalysisNastypradeep@gmail.com
- 18. Cryptanalysis Definition Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key. In non-technical language, this is the practice of codebreaking or cracking the code,Nastypradeep@gmail.com
- 19. As the cryptography plays an important rolein today’s computer security. The cryptographyalgorithms are highly confidential. And so Wecannot discuss the latest encrypting anddecrypting techniques used my mail servers, socialnetworks and etc.. Though we have several hackers and otherforces were seriously trying to encrypt and decryptthe network servers.Nastypradeep@gmail.com
- 20. Nastypradeep@gmail.com
- 21. Applications Used for security issues. Used by social networks to provide security Used to pass messages secretly Used during war times Even we can try to pass messages without other’s knowledge about the messageNastypradeep@gmail.com
- 22. Nastypradeep@gmail.com

Be the first to comment