Your SlideShare is downloading. ×
Cryptography
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cryptography

3,366
views

Published on

PRESENTATION BY 2021HACKER FOR HIS STUDENTS.

PRESENTATION BY 2021HACKER FOR HIS STUDENTS.

Published in: Education, Technology

1 Comment
3 Likes
Statistics
Notes
No Downloads
Views
Total Views
3,366
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
459
Comments
1
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transaction:
  • Transcript

    • 1. Secret Writing
    • 2. Types of Secret Writing Secret writing Steganography Cryptography
    • 3. Overview of Cryptography Terminology
      • Cryptographic/Cipher System - A method of disguising a message so only authorized users may read it.
      • Cryptology - The study of cryptography.
      • Encryption - The process of converting plaintext into ciphertext.
      • Decryption - The process of converting ciphertext back to its original plaintext.
      • Cryptographic Algorithm - The computational procedure used to encrypt and decrypt messages.
      • Cryptanalysis - The process of finding a weakness in, or actual breaking of, a cryptographic system.
    • 4.
        • Cryptography is the science of information security.
        • The word is derived from the Greek  kryptos , meaning hidden.
        • Cryptography includes techniques such as merging words with images, and other ways to hide information in storage or transit.
    • 5.
        • Confidentiality :- the information cannot be understood by anyone for whom it was unintended.
        • Integrity  :-the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected.
        • Authentication  :-the sender and receiver can confirm each others identity and the origin/destination of the information.
    • 6. Overview of Cryptography & Its Applications
        • People wants and needs privacy and security while communicating.
        • In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies (adversaries).
        • Nowadays, with the technologic progress as our dependency on electronic systems has increased we need more sophisticated techniques.
        • Cryptography provides most of the methods and techniques for a secure communication
    • 7. 6 Cryptography components
    • 8.
        • Encryption – It is a process of changing or converting normal text or data information into gibberish text.
        • Decryption – It is a process of changing or converting gibberish text back to correct message or data by using encryption method.
    • 9. 10 Categories of cryptography
    • 10.
        • A single common encryption key is used to encode and decode messages.
        • Both sender and receiver must know the common key.
        • The common key need to be exchanged before hand by some other secure method.
        • Symmetric encryption is simple and fast.
        • But - key management is impractical with large number of senders and receivers.
      11
    • 11. 11 Symmetric-key cryptography
    • 12. Currently Available Crypto Algorithms (private key)
        • DES (Data Encryption Standard) and derivatives: double DES and triple DES
        • IDEA (International Data Encryption Standard)
        • Blowfish
        • RC5 (Rivest Cipher #5)
        • AES (Advance Encryption Standard)
    • 13.
        • Asymmetric system under, which two different keys are used to encrypt and decrypt the message or received data packet.
        • On public key is used to encrypt the data or message and the private key on receiving end is used to decrypt the message or data packet.
        • Each user has a Public key and a corresponding Private (secret) key
      12 Asymmetric-key cryptography
    • 14. Asymmetric-key cryptography
    • 15.
        • RSA (Rivest, Shamir, Adleman)
        • DH (Diffie-Hellman Key Agreement Algorithm)
        • ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)
        • RPK (Raike Public Key)
      Currently Available Crypto Algorithms (public key)
    • 16. Keys used in cryptography
    • 17.
        • public-key cryptography Increased security and convenience.
        • public-key cryptography is best suited for an open multi-user environment.
        • Symmetric encryption is simple and fast.
    • 18. Steganography
      • Steganography – covered writing – is an art of hiding information
      • Popular contemporary steganographic technologies hide information in images
    • 19. Hiding information in pictures Image in which to hide Text Image to hide within the other image
    • 20. Digital Watermarks