Presented By:
Ms. Riddhi Gupta
BCA III Year
Dept. of Computer Science
Sophia Girls’ College
(Autonomous) Ajmer.
Presentation on
CRYPTOGRAPHY
Guided By:
Dr. Ritu Bhargava
Associate Professor
Dept. of Computer Science
Sophia Girls’ College
(Autonomous) Ajmer.
Learning OuTcome 2
Introduction
What is Cryptography?
Purpose of Cryptography
Architecture of Cryptography
Types of Cryptography
Process of cryptography
Conclusion
References
INTRODUCTION
To secure network and data transmission via a wireless network,
cryptography, and network encryption is being used. Providing data
protection is one of the key aspects of wireless network data
transmission.
The need for protection of the wireless network sensor is critical, and
encryption and network security are necessary. Network security
includes security for the terminal system as well as for the whole
network system.
Network security is one of the main concerns as the world transitions
into the digital world. Security of the network provides security for
administrator-managed data. Increasing communication technology
also requires safe communication which is met through various
encryption techniques such as cryptography, digital signatures, and
other applications.
3
What is Cryptography?
Cryptography derived its name from a Greek word called
“krypto’s” which means “Hidden Secrets”.
Cryptography is the practice and study of hiding
information. It is the Art or Science of converting plain
intelligible data into unintelligible data and again
retransforming that message into its original form.
It provides Confidentiality, Integrity, and Accuracy.
Cryptography is a technique of encryption used to protect
the network, as various networks are related and admire
attacks and intrusions. Intrusion and computer protection
technologies are also used in attack forms.
4
Cryptography supports several security aims to provide the privacy of information, non-
alteration of information, and so on. Because of the high-security benefit of cryptography, it
is broadly used today. There are various goals of cryptography which are as follows −
Confidentiality − Information on the system is sent and has to be approached only
by the authorized party and not by anyone else. Confidentiality has been negotiated if
an unauthorized person can make a message. Confidentiality represents that sensitive
data should be restricted from being disclosed to unauthorized parties.
Authentication − Authentication is any process by which it can test that someone is
whom they claim they are. This generally includes a username and a password but can
contain some other approach to demonstrating identities, such as a smart card, retina
scan, voice identification, or fingerprints. Authentication is the same as showing the
driver’s license at the ticket counter at the airport.
Integrity − It can only the authorized party is enabled to change the transmitted
information. No one in between the sender and receiver is enabled to modify the given
message. One approach to providing integrity is to connect a definite indicator or
message digest at the end of the message that is active to be sent. If this digest
remains undamaged during transit then the principle has been canned.
Non-repudiation - A mechanism to prove that the sender sent this message.
7
Types of Cryptography
Secret Key Cryptography
• Single key used to encrypt and decrypt.
• Key must be known by both parties.
• Assuming we live in a hostile environment (otherwise - why the
need for cryptography?), it may be hard to share a secret key.
9
Public Key Cryptography
One of the keys allocated to each person is called the "public
key" and is published in an open directory somewhere where
anyone can easily look it up, for example by email address.
Each entity has 2 keys:
Private Key (a secret)
Public key (well known).
10
Using Keys
Private keys are used for decrypting.
Public keys are used for encrypting.
11
CONCLUSION
We use different types of algorithms to establish security
services in different service mechanisms.
We use either private key cryptography or public key
cryptography according to requirement.
If we want to send a message quickly, we use the private key
algorithm; if we want to send messages secretly, we use the
public key algorithm.
13