SlideShare a Scribd company logo
1 of 13
Cryptography & Network
Security
By:
Brijmohan Lal Sahu
Department of Computer Science
NIT Raipur
The Story
Alice Bob
The Story
Alice Bob
Communicate
The Story
Alice Bob
Communicate
Hi, I am
Alice!
Hi, I am
Alice!
The Story
Alice Bob
Communicate
Hi, I am
Alice!
Tom
Hi, I am
Alice!
Stay away
from Me!
The Story
Alice
Bob
Communicate
Tom
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Cryptography
An art for communicating over insecure channel securely.
It’s a technique that provides security to message from un-intended people.
Basic terms of Cryptography:
● Sender
● Message / Plain Text
● Channel / Medium
● Encryption
● Key
● Decryption
● Receiver
The Story
Alice / Sender Bob / Receiver
Communicate
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Hi, I am
Alice! KEY
Algorithm
abd@
#%$!
encrypted
KEY
Algorithm
Hi, I am
Alice!
Decrypted
abd@
#%$!
encrypted
Encryption Decryption
Cryptography
The security depends on the secrecy of key.
As algorithm is publicly available to everyone.
Now on the basis of number of key there are two types of cryptography:
1. Symmetric Key Cryptography : Only single key is used.
Algorithms used are : Ceaser Cipher, Playfair Cipher, Hill Cipher, Vigenere
Cipher, DES algorithm, AES algorithm.
1. Asymmetric Key Cryptography : Two keys are used.
Algorithm used: RSA, ECC
Cryptography
The strength of cryptographic algorithm lise in computing power required to apply
all possible keys to decrypt it.
And with time as computing power is available slowly some algorithms are
becoming vulnerable and so easy to break that they are no longer in use.
Example : Ceaser Cipher, Playfair Cipher
Same Key : Symmetric Key
Alice / Sender Bob / Receiver
Communicate
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Hi, I am
Alice! KEY
Algorithm
abd@
#%$!
encrypted
KEY
Algorithm
Hi, I am
Alice!
Decrypted
abd@
#%$!
encrypted
Encryption Decryption
Alice / Sender Bob / Receiver
Communicate
Hi, I am
Alice!
Cryptography
abd@
#%$!
encrypted
abd@
#%$!
encrypted
Hi, I am
Alice!
Decrypted
Hi, I am
Alice! KEY
Algorithm
abd@
#%$!
encrypted
KEY 2
Algorithm
Hi, I am
Alice!
Decrypted
abd@
#%$!
encrypted
Encryption Decryption
Different Keys : Asymmetric Key
Network Security
Network ( Computer Network ) is the group of all devices and softwares that
provides the foundation for communication in digital world.
Providing security to all those devices and softwares is known as network security.
Cryptography and Cryptographic algorithms are backbone of Computer Security
or Network Security.

More Related Content

Similar to Cryptography & Network Security

Cryptography
CryptographyCryptography
Cryptographymilanmath
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singhGaurav Singh
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptxMaryam522887
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCLjrice8
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2Tutun Juhana
 
Network Security and Cryptography.pdf
Network Security and Cryptography.pdfNetwork Security and Cryptography.pdf
Network Security and Cryptography.pdfAdityaKumar1548
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - OverviewMohammed Adam
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Node.js interactive NA 2016: Tales From the Crypt
Node.js interactive NA 2016: Tales From the CryptNode.js interactive NA 2016: Tales From the Crypt
Node.js interactive NA 2016: Tales From the CryptAdam Englander
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.pptGhamdan5
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptjamkhan10
 

Similar to Cryptography & Network Security (20)

Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Encryption
EncryptionEncryption
Encryption
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCL
 
Cryptography
CryptographyCryptography
Cryptography
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
Network Security and Cryptography.pdf
Network Security and Cryptography.pdfNetwork Security and Cryptography.pdf
Network Security and Cryptography.pdf
 
Cryptography - Overview
Cryptography - OverviewCryptography - Overview
Cryptography - Overview
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Node.js interactive NA 2016: Tales From the Crypt
Node.js interactive NA 2016: Tales From the CryptNode.js interactive NA 2016: Tales From the Crypt
Node.js interactive NA 2016: Tales From the Crypt
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 

Cryptography & Network Security

  • 1. Cryptography & Network Security By: Brijmohan Lal Sahu Department of Computer Science NIT Raipur
  • 4. The Story Alice Bob Communicate Hi, I am Alice! Hi, I am Alice!
  • 5. The Story Alice Bob Communicate Hi, I am Alice! Tom Hi, I am Alice! Stay away from Me!
  • 6. The Story Alice Bob Communicate Tom Hi, I am Alice! Cryptography abd@ #%$! encrypted abd@ #%$! encrypted abd@ #%$! encrypted Hi, I am Alice! Decrypted
  • 7. Cryptography An art for communicating over insecure channel securely. It’s a technique that provides security to message from un-intended people. Basic terms of Cryptography: ● Sender ● Message / Plain Text ● Channel / Medium ● Encryption ● Key ● Decryption ● Receiver
  • 8. The Story Alice / Sender Bob / Receiver Communicate Hi, I am Alice! Cryptography abd@ #%$! encrypted abd@ #%$! encrypted Hi, I am Alice! Decrypted Hi, I am Alice! KEY Algorithm abd@ #%$! encrypted KEY Algorithm Hi, I am Alice! Decrypted abd@ #%$! encrypted Encryption Decryption
  • 9. Cryptography The security depends on the secrecy of key. As algorithm is publicly available to everyone. Now on the basis of number of key there are two types of cryptography: 1. Symmetric Key Cryptography : Only single key is used. Algorithms used are : Ceaser Cipher, Playfair Cipher, Hill Cipher, Vigenere Cipher, DES algorithm, AES algorithm. 1. Asymmetric Key Cryptography : Two keys are used. Algorithm used: RSA, ECC
  • 10. Cryptography The strength of cryptographic algorithm lise in computing power required to apply all possible keys to decrypt it. And with time as computing power is available slowly some algorithms are becoming vulnerable and so easy to break that they are no longer in use. Example : Ceaser Cipher, Playfair Cipher
  • 11. Same Key : Symmetric Key Alice / Sender Bob / Receiver Communicate Hi, I am Alice! Cryptography abd@ #%$! encrypted abd@ #%$! encrypted Hi, I am Alice! Decrypted Hi, I am Alice! KEY Algorithm abd@ #%$! encrypted KEY Algorithm Hi, I am Alice! Decrypted abd@ #%$! encrypted Encryption Decryption
  • 12. Alice / Sender Bob / Receiver Communicate Hi, I am Alice! Cryptography abd@ #%$! encrypted abd@ #%$! encrypted Hi, I am Alice! Decrypted Hi, I am Alice! KEY Algorithm abd@ #%$! encrypted KEY 2 Algorithm Hi, I am Alice! Decrypted abd@ #%$! encrypted Encryption Decryption Different Keys : Asymmetric Key
  • 13. Network Security Network ( Computer Network ) is the group of all devices and softwares that provides the foundation for communication in digital world. Providing security to all those devices and softwares is known as network security. Cryptography and Cryptographic algorithms are backbone of Computer Security or Network Security.