7. Cryptography
An art for communicating over insecure channel securely.
It’s a technique that provides security to message from un-intended people.
Basic terms of Cryptography:
● Sender
● Message / Plain Text
● Channel / Medium
● Encryption
● Key
● Decryption
● Receiver
8. The Story
Alice / Sender Bob / Receiver
Communicate
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Hi, I am
Alice! KEY
Algorithm
abd@
#%$!
encrypted
KEY
Algorithm
Hi, I am
Alice!
Decrypted
abd@
#%$!
encrypted
Encryption Decryption
9. Cryptography
The security depends on the secrecy of key.
As algorithm is publicly available to everyone.
Now on the basis of number of key there are two types of cryptography:
1. Symmetric Key Cryptography : Only single key is used.
Algorithms used are : Ceaser Cipher, Playfair Cipher, Hill Cipher, Vigenere
Cipher, DES algorithm, AES algorithm.
1. Asymmetric Key Cryptography : Two keys are used.
Algorithm used: RSA, ECC
10. Cryptography
The strength of cryptographic algorithm lise in computing power required to apply
all possible keys to decrypt it.
And with time as computing power is available slowly some algorithms are
becoming vulnerable and so easy to break that they are no longer in use.
Example : Ceaser Cipher, Playfair Cipher
11. Same Key : Symmetric Key
Alice / Sender Bob / Receiver
Communicate
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Hi, I am
Alice! KEY
Algorithm
abd@
#%$!
encrypted
KEY
Algorithm
Hi, I am
Alice!
Decrypted
abd@
#%$!
encrypted
Encryption Decryption
12. Alice / Sender Bob / Receiver
Communicate
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Hi, I am
Alice! KEY
Algorithm
abd@
#%$!
encrypted
KEY 2
Algorithm
Hi, I am
Alice!
Decrypted
abd@
#%$!
encrypted
Encryption Decryption
Different Keys : Asymmetric Key
13. Network Security
Network ( Computer Network ) is the group of all devices and softwares that
provides the foundation for communication in digital world.
Providing security to all those devices and softwares is known as network security.
Cryptography and Cryptographic algorithms are backbone of Computer Security
or Network Security.