SlideShare a Scribd company logo
1 of 20
Seminar on
Cryptography
Submitted by – Anmol Bansal
Roll Number – 195098
Department – CSE
Faculty – Dr. Priyanka Rathee Date – 26-04-2022
What we will cover?
1. What is Cryptography?
2. Its Applications
3. Its Benefits
4. Its Types
5. Symmetric Key Cryptography
6. Asymmetric Key Cryptography
7. and Hashing
Cryptography
Cryptography is the combination of two greek words Kryptos and Graphein.
Kryptos having the meaning hidden and Graphein having the meaning Writing.
Cryptography is a method of securing communications through some
protocols in order to make the information secure or
understandable only by the sender and the receiver.
It provides Confidentiality(i.e. privacy), Integrity(i.e. there was no
modification during the transition) and Availability(i.e. users have
access to the systems and the resources). It is commonly known as
the CIA triad.
Applications
• For Storing Passwords, via Hashing
• In End-to-end encryption for text messaging
Benefits of Cryptography
• Message Confidentiality (or privacy): Only an authorized recipient
should be able to extract the contents of the message from its encrypted
form.
• Message Integrity: The recipient should be able to determine if the
message has been altered (which is implemented with the help of hash
functions).
• Sender Authentication: The recipient should be able to verify from the
message, the identity of the sender, so as to validate claims from
emitter.
• Sender Non-Repudiation: The emitter should not be able to deny
sending the message.
Some Terminology
• Cipher text – Cipher text is the scrambled text transformed from
plaintext using an algorithm.
• Encryption – The process of converting plain text into an
unintelligible format (i.e. cipher text) is called Encryption.
• Decryption - The process of converting cipher text into a plain
text is called Decryption.
• Key – A key is a variable value that is applied using an algorithm to
a string or block of unencrypted text to produce encrypted text,
or to decrypt encrypted text.
Types of Cryptography
1. Symmetric Key Cryptography (or Secret/Private
Key Cryptography)
2. Asymmetric Key Cryptography (or Public Key
Cryptography)
3. Hashing
Symmetric Key Cryptography
Symmetric encryption is the method of securing data. The reason why it’s
called “symmetric” is because it’s a process that involves the use of a
single key by communicating parties to encrypt and decrypt the data.
Advantages - The most significant advantage when it comes to the
symmetric encryption method is its simplicity. As it has only one key doing
encryption and decryption, symmetric encryption algorithms are
considered the fastest and require less computational power to perform.
Disadvantages - The receiver needs to get the secret key from the sender.
Algorithms – AES, DES(i.e. Data Encryption Standard), 3DES
How encryption works for symmetric key cryptography?
1. The sender uses an
encryption key (usually
a string of letters and
numbers) to encrypt
their message.
2. The encrypted
message, called cipher
text, looks like
scrambled letters and
can’t be decrypted by
anyone along the way.
3. The recipient uses a
decryption key to
transform the cipher text
back into readable text.
Question - How many encryption keys are required
to implement a symmetric algorithm with N
participants?
Answer - ⁿC₂
Explanation –
Since every communicating pair in the
system should have a unique key. Thus the
number of keys required to connect N
parties using symmetric cryptography is
given by the formula: (N * (N-1)) / 2.
Asymmetric Key Cryptography
Asymmetric encryption involves the use of multiple keys for data
encryption and decryption. To be exact, the asymmetric encryption
method consists two encryption keys that are mathematically related to
each other. These keys are known as the public key and private key.
Advantages - Security is increased since the private keys don't ever have to
be transmitted or revealed to anyone.
Disadvantages – It is slower and requires more computational power
because of its complexity.
Algorithms - RSA
How encryption works for asymmetric key cryptography?
1.Asymmetric
encryption uses a
mathematically related
pair of keys for
encryption and
decryption: a public key
and a private key.
2.If the public key is
used for encryption,
then the related private
key is used for
decryption.
3.If the private key is
used for encryption,
then the related public
key is used for
decryption.
Question - How many encryption keys are required
to implement an asymmetric algorithm with N
participants?
Answer – 2N
Explanation –
Each time a new user is added to the system, it needs only one
public key and one private key. Thus, for n users, we have 2N keys.
Hashing
Hashing is the process of transforming large sized data into a small
sized code of a fixed length via the use of hash functions.
The process of hashing is different from encryption as hashing is
irreversible.
Some of the hash functions are – SHA256 and SHA512 i.e. Secure
Hash Algorithm.
Conclusion
• We use either private key cryptography or public key cryptography
according to our requirement.
• If we want to send messages quickly we use private key algorithm
and if we want to send messages secretly we use public key
algorithm.
References
• www.tutorialspoint.com
• www.slideshare.net
• www.researchgate.net
• www.wordpress.com
• www.sectigostore.com
• www.wikipedia.com
• www.youtube.com
• www.cs.utexas.edu
• www.medium.com
• www.geeksforgeeks.org
• www.analyticssteps.com
• learn.saylor.org
• crypto.stackexchange.com
Thank You
Any Query?

More Related Content

Similar to Cryptography.pptx

White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxMohamedNowfeek1
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackMona Rajput
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
cryptography
cryptographycryptography
cryptographyswatihans
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 

Similar to Cryptography.pptx (20)

RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Network security
Network securityNetwork security
Network security
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
Types of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic AttackTypes of Cryptosystem and Cryptographic Attack
Types of Cryptosystem and Cryptographic Attack
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Security
SecuritySecurity
Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
cryptography
cryptographycryptography
cryptography
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Cryptography.pptx

  • 1. Seminar on Cryptography Submitted by – Anmol Bansal Roll Number – 195098 Department – CSE Faculty – Dr. Priyanka Rathee Date – 26-04-2022
  • 2. What we will cover? 1. What is Cryptography? 2. Its Applications 3. Its Benefits 4. Its Types 5. Symmetric Key Cryptography 6. Asymmetric Key Cryptography 7. and Hashing
  • 3.
  • 4. Cryptography Cryptography is the combination of two greek words Kryptos and Graphein. Kryptos having the meaning hidden and Graphein having the meaning Writing. Cryptography is a method of securing communications through some protocols in order to make the information secure or understandable only by the sender and the receiver. It provides Confidentiality(i.e. privacy), Integrity(i.e. there was no modification during the transition) and Availability(i.e. users have access to the systems and the resources). It is commonly known as the CIA triad.
  • 5. Applications • For Storing Passwords, via Hashing • In End-to-end encryption for text messaging
  • 6. Benefits of Cryptography • Message Confidentiality (or privacy): Only an authorized recipient should be able to extract the contents of the message from its encrypted form. • Message Integrity: The recipient should be able to determine if the message has been altered (which is implemented with the help of hash functions). • Sender Authentication: The recipient should be able to verify from the message, the identity of the sender, so as to validate claims from emitter. • Sender Non-Repudiation: The emitter should not be able to deny sending the message.
  • 7. Some Terminology • Cipher text – Cipher text is the scrambled text transformed from plaintext using an algorithm. • Encryption – The process of converting plain text into an unintelligible format (i.e. cipher text) is called Encryption. • Decryption - The process of converting cipher text into a plain text is called Decryption. • Key – A key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text.
  • 8. Types of Cryptography 1. Symmetric Key Cryptography (or Secret/Private Key Cryptography) 2. Asymmetric Key Cryptography (or Public Key Cryptography) 3. Hashing
  • 9.
  • 10. Symmetric Key Cryptography Symmetric encryption is the method of securing data. The reason why it’s called “symmetric” is because it’s a process that involves the use of a single key by communicating parties to encrypt and decrypt the data. Advantages - The most significant advantage when it comes to the symmetric encryption method is its simplicity. As it has only one key doing encryption and decryption, symmetric encryption algorithms are considered the fastest and require less computational power to perform. Disadvantages - The receiver needs to get the secret key from the sender. Algorithms – AES, DES(i.e. Data Encryption Standard), 3DES
  • 11. How encryption works for symmetric key cryptography? 1. The sender uses an encryption key (usually a string of letters and numbers) to encrypt their message. 2. The encrypted message, called cipher text, looks like scrambled letters and can’t be decrypted by anyone along the way. 3. The recipient uses a decryption key to transform the cipher text back into readable text.
  • 12. Question - How many encryption keys are required to implement a symmetric algorithm with N participants? Answer - ⁿC₂ Explanation – Since every communicating pair in the system should have a unique key. Thus the number of keys required to connect N parties using symmetric cryptography is given by the formula: (N * (N-1)) / 2.
  • 13. Asymmetric Key Cryptography Asymmetric encryption involves the use of multiple keys for data encryption and decryption. To be exact, the asymmetric encryption method consists two encryption keys that are mathematically related to each other. These keys are known as the public key and private key. Advantages - Security is increased since the private keys don't ever have to be transmitted or revealed to anyone. Disadvantages – It is slower and requires more computational power because of its complexity. Algorithms - RSA
  • 14. How encryption works for asymmetric key cryptography? 1.Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. 2.If the public key is used for encryption, then the related private key is used for decryption. 3.If the private key is used for encryption, then the related public key is used for decryption.
  • 15. Question - How many encryption keys are required to implement an asymmetric algorithm with N participants? Answer – 2N Explanation – Each time a new user is added to the system, it needs only one public key and one private key. Thus, for n users, we have 2N keys.
  • 16. Hashing Hashing is the process of transforming large sized data into a small sized code of a fixed length via the use of hash functions. The process of hashing is different from encryption as hashing is irreversible. Some of the hash functions are – SHA256 and SHA512 i.e. Secure Hash Algorithm.
  • 17.
  • 18. Conclusion • We use either private key cryptography or public key cryptography according to our requirement. • If we want to send messages quickly we use private key algorithm and if we want to send messages secretly we use public key algorithm.
  • 19. References • www.tutorialspoint.com • www.slideshare.net • www.researchgate.net • www.wordpress.com • www.sectigostore.com • www.wikipedia.com • www.youtube.com • www.cs.utexas.edu • www.medium.com • www.geeksforgeeks.org • www.analyticssteps.com • learn.saylor.org • crypto.stackexchange.com