Cryptography
Upcoming SlideShare
Loading in...5
×
 

Cryptography

on

  • 3,289 views

Basics of cryptography, starting from ancient techniques to a few modern day processes.

Basics of cryptography, starting from ancient techniques to a few modern day processes.

Statistics

Views

Total Views
3,289
Views on SlideShare
3,284
Embed Views
5

Actions

Likes
2
Downloads
406
Comments
2

2 Embeds 5

http://www.linkedin.com 3
https://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Book: Internet Security, Cryptographic principles, algorithms and protocols by Man Young Rhee
    Are you sure you want to
    Your message goes here
    Processing…
  • Very informative preso!
    Hi, I really interested in this topics and still new in this subject. Any recommended sites or books I should go thru for newbie?

    Thanks!
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cryptography Presentation Transcript

  • 1. CRYPTOGRAPHY
    Presented By:
    Niharjyoti Sarangi (06/232)
    Sukant Kumar Bishi (06/231)
  • 2. Cryptography :
    The word “Cryptography” is derived from Greek words κρυπτόςkryptós meaning “hidden” and γράφωgráfo meaning “to write”.
    Cryptography is the practice and study of hiding information.
    It is considered as a branch of both Mathematics and Computer Science.
  • 3. A Brief History of Cryptography :
    Probable origin of cryptography : 2000 B.C. In Egypt. (Hieroglyphics).
  • 4. A Brief History of Cryptography (contd.) :
    The ancient Chinese art of Cryptography: Ideography.
    Petroglyph (An Ideograph on rock surface)
  • 5. A Brief History of Cryptography (contd.) :
    The ancient art of Cryptography in Mesopotamia, Babylon, Assyria: Cuneiforms and Atbash ciphers.
  • 6. A Brief History of Cryptography (contd.) :
    Spartan art of Cryptography : A system which consisted of a thin sheet of papyrus wrapped around a staff.
    • Messages were written down the length of the staff, and the papyrus was unwrapped. In order to read the message, the papyrus had to be wrapped around a staff of equal diameter.
  • A Brief History of Cryptography (contd.) :
    Scytale
  • 7. A Brief History of Cryptography (contd.) :
  • 8. A Brief History of Cryptography (contd.) :
    Polybius Squares:
  • 9. A Brief History of Cryptography (contd.) :
    Caesar Cipher:
    Monoalphabetic Substitution
  • 10. A Brief History of Cryptography (contd.) :
    Polyalphabetic Substitution:
    • Devised by Leon Battista Alberti (Father of Western cryptology)
    • 11. Uses two concentric discs with letters written on both of them.
  • A Brief History of Cryptography (contd.) :
    Vigenere Cipher:
    • Uses the basics of Trithemius table but the key system is slightly changed.
    • 12. Wrote this in his book “Tracte des Chiffres”.
  • A Brief History of Cryptography (contd.) :
    Wars:
  • 13. Elements of Cryptography:
    Encryption
    Decryption
    Key
  • 14. Encryption and Decryption
    The process of disguising a message in such a way as to hide its substance is encryption.
    An encrypted message is cipher text.
    The process of turning cipher text back into plaintext is decryption.
    Plain Text
    Cipher Text
    Plain Text
    Encryption
    Decryption
  • 15. Key:
    A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
  • 16. Types of Cryptography:
    Based on the type of key used, Cryptography is broadly categorized into:
    Symmetric Key Cryptography
    Asymmetric Key Cryptography
  • 17. Symmetric key Cryptography:
  • 18. DES(Data Encryption Standard):
  • 19. Asymmetric key Cryptography:
    • Also called as Public Key Cryptography.
  • RSA Algorithm:
    Rivest, Shamir and Adleman
  • 20. RSA Algorithm (Contd.):
  • 21. RSA Algorithm (contd.):
    Key Generation
  • 22. RSA Algorithm (contd.):
    Encryption
    Decryption
  • 23. Diffie-Hellman Key Exchange:
  • 24. Applications of Cryptography:
    ISDN
    Kerberos
    Kryptoknight
    Sesame
    PEM
    PGP
    Smart Cards
    UEPS
    Clipper Chip (MYK-78T)
    Cap Stone (MYK-80)
  • 25. Thank You
    Niharjyoti Sarangi
    Sukant Kumar Bishi