Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Created By : Rahul Khanvani
Roll No : 47
Department Of Computer Science
Cryptography:
Securing the Information.
Rahul Khan...
Introduction
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
» EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?
 Does it look like nonsense to you ?
 Did you notice that I asked y...
» Cryptography is the art and science of converting ordinary information
into gibberish and converting it back to its orig...
» If You Say No Then I Can Say You May B Don’t Use Cryptography.
 Do You Use Gmail ?
 Do You use Facebook ?
 Have you E...
» Plaintext – A message in its natural format readable by an attacker
» Cipher text – Message altered to be unreadable by ...
» Defending against external/internal hackers
» Securing E-commerce
» Securing bank accounts/electronic transfers
» Securi...
» Pervasiveness of email/networks
» Online storage of sensitive information
» Insecure technologies (e.g. wireless)
» Tren...
How To Send A Secure Email Or Password Protected Email?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Types Of Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Secret Writing
Steganography
Cryptography
Types of Secret Writing
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Steganography – covered writing
 – is an art of hiding information
» Popular contemporary steganography
technologies hi...
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Encryption means the transformation of data by the use of
Cryptography to produce unintelligible data to ensure confiden...
» Private (symmetric, secret) key – the same key used for
encryption/decryption
» Problem of key distribution
» How Do Bot...
» Public (asymmetric) key cryptography – a public key used for encryption
and private key for decryption
» Key distributio...
 DES (Data Encryption Standard) and derivatives: double DES and triple DES
 IDEA (International Data Encryption Standard...
 RSA (Rivest, Shamir, Adleman)
 DH (Diffie-Hellman Key Agreement Algorithm)
 ECDH (Elliptic Curve Diffie-Hellman Key Ag...
» Algorithms are not theoretically unbreakable: successful attacks in the
future are possible.
» Encryption does not guara...
Thank You…
For More Visit Bnarybuzz.wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Upcoming SlideShare
Loading in …5
×

Cryptography

1,241 views

Published on

Published in: Technology, Education
  • Be the first to comment

Cryptography

  1. 1. Created By : Rahul Khanvani Roll No : 47 Department Of Computer Science Cryptography: Securing the Information. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  2. 2. Introduction Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  3. 3. Introduction » EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?  Does it look like nonsense to you ?  Did you notice that I asked you the same question twice ?  Confused ? » Replace Each word With its Alphabet used before. » The Cryptography is Simple  Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  4. 4. » Cryptography is the art and science of converting ordinary information into gibberish and converting it back to its original, meaningful form. » Its Amazing how rotating the alphabets by even just one position is enough to confuse human mind ! » We Call It Rotating Words. » To convert data in meaningful form you need an algorithm , » you can also create your own small algorithm. What Is Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  5. 5. » If You Say No Then I Can Say You May B Don’t Use Cryptography.  Do You Use Gmail ?  Do You use Facebook ?  Have you Ever Opened a File Containing Password ?  Did U Use HTTPS Site ?  Do You Fill Forms on Internet ? » Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A Kind Of Cryptogrpahy.  E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives. Who Uses Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  6. 6. » Plaintext – A message in its natural format readable by an attacker » Cipher text – Message altered to be unreadable by anyone except the intended recipients » Key – Sequence that controls the operation and behavior of the cryptographic algorithm » Key-space – Total number of possible values of keys in a crypto algorithm » Encryption  Plain text  Cipher text » Decryption  Cipher text  Plain text Terms Used In Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  7. 7. » Defending against external/internal hackers » Securing E-commerce » Securing bank accounts/electronic transfers » Securing intellectual property Information Security for… Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  8. 8. » Pervasiveness of email/networks » Online storage of sensitive information » Insecure technologies (e.g. wireless) » Trend towards paperless society » Weak legal protection of email privacy. Threats to Information Security Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  9. 9. How To Send A Secure Email Or Password Protected Email? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  10. 10. Types Of Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  11. 11. Secret Writing Steganography Cryptography Types of Secret Writing Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  12. 12. » Steganography – covered writing  – is an art of hiding information » Popular contemporary steganography technologies hide information in images. Steganography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  13. 13. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  14. 14. » Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality » The inverse function of encryption is called as decryption Encryption and decryption:- Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  15. 15. » Private (symmetric, secret) key – the same key used for encryption/decryption » Problem of key distribution » How Do Both Person Agree On Same Key ? Private Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  16. 16. » Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption » Key distribution problem solved Public Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  17. 17.  DES (Data Encryption Standard) and derivatives: double DES and triple DES  IDEA (International Data Encryption Standard)  Blowfish  RC5 (Rivets Cipher #5)  AES (Advance Encryption Standard) Currently Available Crypto Algorithms (private key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  18. 18.  RSA (Rivest, Shamir, Adleman)  DH (Diffie-Hellman Key Agreement Algorithm)  ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)  RPK (Raike Public Key) Currently Available Crypto Algorithms (public key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  19. 19. » Algorithms are not theoretically unbreakable: successful attacks in the future are possible. » Encryption does not guarantee security! » Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:  Viruses, worms, hackers, etc.  TEMPEST attacks,  Unauthorized physical access to secret keys » Cryptography is only one element of comprehensive computer security How Secure are Today’s Technologies? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  20. 20. Thank You… For More Visit Bnarybuzz.wordpress.com Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com

×