SlideShare a Scribd company logo
1 of 19
CRYPTOGRAPHY
& ITS
TECHNIQUES
TEAM
Sushant Aggarwal 21BCE10152
Shalini Jha 21BCE10869
Ujjawal Aggarwal 21BCE10891
Aditya Bhardwaj 21BSA10022
CRYPTOGRAPHY
ADVANTAGES OF
CRYPTOGRAPHY
TYPES OF
CRYPTOGRAPHY
APPLICATIONS OF
CRYPTOGRAPHY
CRYPTOGRAPHY
01
CRYPTOGRAPHY
Cryptography is the science and art of securing
information by transforming it into an unreadable
format, known as ciphertext, using various
algorithms and techniques. It involves encoding
sensitive data to ensure confidentiality, integrity,
authenticity, and non-repudiation during
transmission and storage. Cryptography allows
authorized parties to access the information while
keeping it inaccessible to unauthorized users.
FEATURES OF CRYPTOGRAPHY
BENEFITS OF CRYPTOGRAPHY
 Cryptography ensures access control by using
encryption for authorized parties.
 Secure online communication relies on cryptography for
protecting sensitive data.
 Cryptography defends against attacks like replay and
man-in-the-middle.
 Cryptography helps meet legal data protection
requirements.
 Cryptography is the science of securing data
using mathematical algorithms and keys.
 It converts plaintext into unreadable ciphertext
and vice versa through encryption and
decryption
 It ensures confidentiality, integrity, and
authentication of information, enabling secure
communication and defense against attacks.
TYPES OF
CRYPTOGRAPHY
02
TYPES OF CRYPTOGRAPHY
CLASSIFICATION
Symmetric Key
Cryptography
Uses the same secret key
for both encryption and
decryption of data.
Hash Functions
Mathematical algorithms that
generate a fixed-size hash value
from input data, used for data
integrity verification and
password storage
Asymmetric Key
Cryptography
Utilizes a pair of mathematically
related keys (public and private
keys) for encryption and
decryption, enabling secure
communication and digital
signatures.
SYMMETRIC KEY CRYPTOGRAPHY
It is an encryption system
where the sender and
receiver of message use a
single common key to
encrypt and decrypt
messages. Symmetric Key
Systems are faster and
simpler but the problem is
that sender and receiver have
to somehow exchange key in
a secure manner. The most
popular symmetric key
cryptography system are
Data Encryption System(DES)
and Advanced Encryption
System(AES).
HASH FUNCTIONS
There is no usage of any key
in this algorithm. A hash value
with fixed length is calculated
as per the plain text which
makes it impossible for
contents of plain text to be
recovered. Many operating
systems use hash functions to
encrypt passwords.
Fiber Cable is 20 times faster than regular internet cable
ASYMMETRIC KEY CRYPTOGRAPHY
Under this system a pair of keys is used to encrypt
and decrypt information. A receiver’s public key is
used for encryption and a receiver’s private key is
used for decryption. Public key and Private Key are
different. Even if the public key is known by
everyone the intended receiver can only decode it
because he alone know his private key. The most
popular asymmetric key cryptography algorithm is
RSA algorithm.
ADVANTAGES OF
CRYPTOGRAPHY
ADVANTAGES OF CRYPTOGRAPHY
 Access Control: Cryptography can be used for access control to ensure that only parties with
the proper permissions have access to a resource. Only those with the correct decryption key can
access the resource thanks to encryption.
 Secure Communication: For secure online communication, cryptography is crucial. It offers
secure mechanisms for transmitting private information like passwords, bank account numbers,
and other sensitive data over the internet.
 Protection against attacks: Cryptography aids in the defence against various types of assaults,
including replay and man-in-the-middle attacks. It offers strategies for spotting and stopping
these assaults.
 Compliance with legal requirements: Cryptography can assist firms in meeting a variety of
legal requirements, including data protection and privacy legislation.
APPLICATION OF
CRYPTOGRAPHY
04
APPLICATIONS OF CRYPTOGRAPHY
 Computer passwords: Cryptography is widely utilized in computer security, particularly when
creating and maintaining passwords. When a user logs in, their password is hashed and compared to
the hash that was previously stored. Passwords are hashed and encrypted before being stored. In this
technique, the passwords are encrypted so that even if a hacker gains access to the password
database, they cannot read the passwords.
 Digital Currencies: To safeguard transactions and prevent fraud, digital currencies like Bitcoin also
use cryptography. Complex algorithms and cryptographic keys are used to safeguard transactions,
making it nearly hard to tamper with or forge the transactions.
 Secure web browsing: Online browsing security is provided by the use of cryptography, which
shields users from eavesdropping and man-in-the-middle assaults. Public key cryptography is used
by the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt data sent
between the web server and the client, establishing a secure channel for communication.
 Electronic signatures: Electronic signatures serve as the digital equivalent of a handwritten
signature and are used to sign documents. Digital signatures are created using cryptography and can
be validated using public key cryptography. In many nations, electronic signatures are enforceable by
law, and their use is expanding quickly.
APPLICATIONS OF CRYPTOGRAPHY
 Authentication: Cryptography is used for authentication in many different situations, such as when
accessing a bank account, logging into a computer, or using a secure network. Cryptographic
methods are employed by authentication protocols to confirm the user’s identity and confirm that
they have the required access rights to the resource.
 Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin and Ethereum to
safeguard transactions, thwart fraud, and maintain the network’s integrity. Complex algorithms and
cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge
the transactions.
 End-to-End Encryption: End-to-end encryption is used to protect two-way communications like
video conversations, instant messages, and email. Even if the message is encrypted, it assures that
only the intended receivers can read the message. End-to-end encryption is widely used in
communication apps like WhatsApp and Signal, and it provides a high level of security and privacy for
users.
THANK
YOU!

More Related Content

Similar to CN GP 4 Cryptogaraphy.pptx

Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryptionSejahtera Affif
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Chapter 08
Chapter 08Chapter 08
Chapter 08cclay3
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 

Similar to CN GP 4 Cryptogaraphy.pptx (20)

Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Cryptography
Cryptography Cryptography
Cryptography
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Cryptography
CryptographyCryptography
Cryptography
 

More from GarimaJain745610

L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptxGarimaJain745610
 
CS553_ST7_Ch03-DataTransmission.ppt
CS553_ST7_Ch03-DataTransmission.pptCS553_ST7_Ch03-DataTransmission.ppt
CS553_ST7_Ch03-DataTransmission.pptGarimaJain745610
 
Introduction to Modulation and Demodulation.ppt
Introduction to Modulation and Demodulation.pptIntroduction to Modulation and Demodulation.ppt
Introduction to Modulation and Demodulation.pptGarimaJain745610
 
9_2018_12_28!10_34_32_PM.ppt
9_2018_12_28!10_34_32_PM.ppt9_2018_12_28!10_34_32_PM.ppt
9_2018_12_28!10_34_32_PM.pptGarimaJain745610
 

More from GarimaJain745610 (9)

L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
 
Transmission Mode.pptx
Transmission Mode.pptxTransmission Mode.pptx
Transmission Mode.pptx
 
CN GP 5 WEB FTP EMAIL.pdf
CN GP 5 WEB FTP EMAIL.pdfCN GP 5 WEB FTP EMAIL.pdf
CN GP 5 WEB FTP EMAIL.pdf
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
CS553_ST7_Ch03-DataTransmission.ppt
CS553_ST7_Ch03-DataTransmission.pptCS553_ST7_Ch03-DataTransmission.ppt
CS553_ST7_Ch03-DataTransmission.ppt
 
Introduction to Modulation and Demodulation.ppt
Introduction to Modulation and Demodulation.pptIntroduction to Modulation and Demodulation.ppt
Introduction to Modulation and Demodulation.ppt
 
AnalogDigitalSignals1.ppt
AnalogDigitalSignals1.pptAnalogDigitalSignals1.ppt
AnalogDigitalSignals1.ppt
 
9_2018_12_28!10_34_32_PM.ppt
9_2018_12_28!10_34_32_PM.ppt9_2018_12_28!10_34_32_PM.ppt
9_2018_12_28!10_34_32_PM.ppt
 
network-topology.ppt
network-topology.pptnetwork-topology.ppt
network-topology.ppt
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

CN GP 4 Cryptogaraphy.pptx

  • 2. TEAM Sushant Aggarwal 21BCE10152 Shalini Jha 21BCE10869 Ujjawal Aggarwal 21BCE10891 Aditya Bhardwaj 21BSA10022
  • 5. CRYPTOGRAPHY Cryptography is the science and art of securing information by transforming it into an unreadable format, known as ciphertext, using various algorithms and techniques. It involves encoding sensitive data to ensure confidentiality, integrity, authenticity, and non-repudiation during transmission and storage. Cryptography allows authorized parties to access the information while keeping it inaccessible to unauthorized users.
  • 7. BENEFITS OF CRYPTOGRAPHY  Cryptography ensures access control by using encryption for authorized parties.  Secure online communication relies on cryptography for protecting sensitive data.  Cryptography defends against attacks like replay and man-in-the-middle.  Cryptography helps meet legal data protection requirements.
  • 8.  Cryptography is the science of securing data using mathematical algorithms and keys.  It converts plaintext into unreadable ciphertext and vice versa through encryption and decryption  It ensures confidentiality, integrity, and authentication of information, enabling secure communication and defense against attacks.
  • 10. TYPES OF CRYPTOGRAPHY CLASSIFICATION Symmetric Key Cryptography Uses the same secret key for both encryption and decryption of data. Hash Functions Mathematical algorithms that generate a fixed-size hash value from input data, used for data integrity verification and password storage Asymmetric Key Cryptography Utilizes a pair of mathematically related keys (public and private keys) for encryption and decryption, enabling secure communication and digital signatures.
  • 11. SYMMETRIC KEY CRYPTOGRAPHY It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system are Data Encryption System(DES) and Advanced Encryption System(AES).
  • 12. HASH FUNCTIONS There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.
  • 13. Fiber Cable is 20 times faster than regular internet cable ASYMMETRIC KEY CRYPTOGRAPHY Under this system a pair of keys is used to encrypt and decrypt information. A receiver’s public key is used for encryption and a receiver’s private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone know his private key. The most popular asymmetric key cryptography algorithm is RSA algorithm.
  • 15. ADVANTAGES OF CRYPTOGRAPHY  Access Control: Cryptography can be used for access control to ensure that only parties with the proper permissions have access to a resource. Only those with the correct decryption key can access the resource thanks to encryption.  Secure Communication: For secure online communication, cryptography is crucial. It offers secure mechanisms for transmitting private information like passwords, bank account numbers, and other sensitive data over the internet.  Protection against attacks: Cryptography aids in the defence against various types of assaults, including replay and man-in-the-middle attacks. It offers strategies for spotting and stopping these assaults.  Compliance with legal requirements: Cryptography can assist firms in meeting a variety of legal requirements, including data protection and privacy legislation.
  • 17. APPLICATIONS OF CRYPTOGRAPHY  Computer passwords: Cryptography is widely utilized in computer security, particularly when creating and maintaining passwords. When a user logs in, their password is hashed and compared to the hash that was previously stored. Passwords are hashed and encrypted before being stored. In this technique, the passwords are encrypted so that even if a hacker gains access to the password database, they cannot read the passwords.  Digital Currencies: To safeguard transactions and prevent fraud, digital currencies like Bitcoin also use cryptography. Complex algorithms and cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge the transactions.  Secure web browsing: Online browsing security is provided by the use of cryptography, which shields users from eavesdropping and man-in-the-middle assaults. Public key cryptography is used by the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt data sent between the web server and the client, establishing a secure channel for communication.  Electronic signatures: Electronic signatures serve as the digital equivalent of a handwritten signature and are used to sign documents. Digital signatures are created using cryptography and can be validated using public key cryptography. In many nations, electronic signatures are enforceable by law, and their use is expanding quickly.
  • 18. APPLICATIONS OF CRYPTOGRAPHY  Authentication: Cryptography is used for authentication in many different situations, such as when accessing a bank account, logging into a computer, or using a secure network. Cryptographic methods are employed by authentication protocols to confirm the user’s identity and confirm that they have the required access rights to the resource.  Cryptocurrencies: Cryptography is heavily used by cryptocurrencies like Bitcoin and Ethereum to safeguard transactions, thwart fraud, and maintain the network’s integrity. Complex algorithms and cryptographic keys are used to safeguard transactions, making it nearly hard to tamper with or forge the transactions.  End-to-End Encryption: End-to-end encryption is used to protect two-way communications like video conversations, instant messages, and email. Even if the message is encrypted, it assures that only the intended receivers can read the message. End-to-end encryption is widely used in communication apps like WhatsApp and Signal, and it provides a high level of security and privacy for users.