Cryptography

3,092 views

Published on

its just showing an outline of crytography

Published in: Education, Technology
3 Comments
4 Likes
Statistics
Notes
No Downloads
Views
Total views
3,092
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
336
Comments
3
Likes
4
Embeds 0
No embeds

No notes for slide

Cryptography

  1. 1. Concept of Cryptography Presented by KuralAmuthan.C.V Nirmalkumar.R.E Ramkumar.M Manimaran.M
  2. 2. What is cryptographyCryptography is the science of information security.The word is derived from the Greek, kryptos- hiddenGraphy-writing. It’s a efficient method of transmitting messages in asecured manner.
  3. 3. History of cryptography The history of cryptography has beenexplained in following slides with pictorialrepresentation It is further classified into• Ancient cryptography• Modern cryptography
  4. 4. Ancient cryptographySumerian’s cuneiform writing (3500 BC)
  5. 5. Ancient cryptographyEgypts cryptography writing(1900 BC)
  6. 6. Ancient CryptographyHistory tells us that Julius Caesar enciphered his dispatchesby writing D for A Ex: If message is “CALL ME” means, It is encrypted to“FDOO PH“
  7. 7. Modern cryptography“The Enigma Machine” invented by German militaryduring world war I.
  8. 8. Modern cryptographyGerman Lorenz cipher machine, used in World War II toencrypt very-high-level general staff messages
  9. 9. Purpose of cryptographyAuthentication: The process of proving ones identity.Confidentiality: Ensuring that no one can read themessage except the intended receiver.Integrity: Assuring the receiver that the receivedmessage has not been altered in any way from the original.Non-repudiation: A mechanism to prove that thesender really sent this message
  10. 10. Outline of Cryptography
  11. 11. TerminologyKey word The shared secret used to keep the message secretCiphertext The encrypted messageEncryption The process of turning plaintext to ciphertextDecryption Opposite to the Encryption
  12. 12. Types of CryptographySymmetry cryptographyAsymmetry cryptographyHash function
  13. 13. Symmetric CryptographyUses same key for both encryption anddecryption
  14. 14. Asymmetric CryptographyAlso known as public keyUses two key (public & private) for encryptionand decryption Public key Private key
  15. 15. Hash functionHash function also called as message digestIt doesnt require the key, since plaintext notrecovered from ciphertext.Hash function are typically used forverification of file content.
  16. 16. Application of cryptography There are many applications available. Fewof them listed below.Digital SignatureSmart cardElectronic commerceComputer passwordATM
  17. 17. Conclusion Cryptography is only the part of securitysystem Its not a magic bullet Even though technology improved, there issome deflect. No one in world is perfect andstable we try improve our self in future needs

×