SlideShare a Scribd company logo
1 of 12
Cryptography
Cryptography: Cryptography is a technique of encrypting the clear text into scrambled code
This encrypted data is sent over public or private network toward destination to ensure confidentiality
The encrypted data is known as cipher text
Cryptanalysis: Study & methods used to crack cipher text
Objectives of Cryptography:
-Confidentiality
-Integrity
-Authentication
-Non Repudiation
Reviewer:-Raghul Prepared by:-Sandesh S M
Types Of Cryptography
• Symmetric Cryptography
-Uses the same secret key for encryption & decryption of data
-Most Widely Used symmetric ciphers are AES & DES
-Suitable for large amounts of data
-128 bit or larger symmetric keys are common
-Can be very fast to use
Disadvantage of symmetric cryptography
-Not scalable
-Non repudiation is possible because everyone has copy of key
-Key must be regenerated when anyone leaves the group of keyholders
• Asymmetric Cryptography
-Two keys are used
-Public Key available for anyone
-Private key is kept secret
-Also know as public key cryptography
-RSA,DSA & Diffie-Hellman algorithm are popular examples of asymmetric ciphers
-Delivers Confidentiality,Integrity,Autenticity & non repudiation
Disadvantage of Asymmetric Cryptography
-Slow in processing & requires high processing power
-Can’t be decrypted if private key is lost
Reviewer:-Raghul Prepared by:-Sandesh S M
Cryptosystem or Cipher System
A Cryptosystem is an implementation of cryptographic techniques & their accompanying infrastructure to
provide information security services.
A crypto system is referred to as cipher system
Defines key properties,communication requirements for the key exchange,Actions through encryption &
decryption process
Symmetric Cryptosystems:
Reviewer:-Raghul Prepared by:-Sandesh S M
Types of Ciphers
Hashes
• Process of transforming any given key or string of characters into another value
• One way Encryption
• Verify the integrity of the message
• Verifies Authenticity of message(Proof of origin & non repudiation)
• Impossible to recover the original message
• Used to store passwords using confidentiality
• Message Digest(One way Hash )Functions:
Reviewer:-Raghul Prepared by:-Sandesh S M
Hashing Algorithms
• MD5-Message Digest Function
-First Published in April 1992
-Replaced MD4
-Produces 128 bit Hash value
• SHA-Secure hash Algorithm
-Developed by NSA
-Widely Used
-Produces 160-bit Hashing
• SHA 2-Secure Hash Algorithm 2
-Option to vary digest between 224 bits to 512 bits
-Includes SHA-256,SHA-384 & SHA-512
• SHA 3-Secure Hash Algorithm 3
-Uses Hash function keccack
-Replaced by SHA 1 & SHA 2
Hash message Authentication Code-HMAC
Public Key Infrastructure-PKI
Digital Certificates
Encrypted Communication
Cryptography Attacks
CEH Module 20  Cryptograhy PPT.pptx

More Related Content

Similar to CEH Module 20 Cryptograhy PPT.pptx

An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 

Similar to CEH Module 20 Cryptograhy PPT.pptx (20)

Network security
Network securityNetwork security
Network security
 
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
Cryptographic Chronicles: Unveiling Definitions, Algorithms, Attacks, and App...
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Security - ch3.pptx
Security - ch3.pptxSecurity - ch3.pptx
Security - ch3.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric VanderburgInformation Security Lesson 8 - Cryptography - Eric Vanderburg
Information Security Lesson 8 - Cryptography - Eric Vanderburg
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 

CEH Module 20 Cryptograhy PPT.pptx

  • 1. Cryptography Cryptography: Cryptography is a technique of encrypting the clear text into scrambled code This encrypted data is sent over public or private network toward destination to ensure confidentiality The encrypted data is known as cipher text Cryptanalysis: Study & methods used to crack cipher text Objectives of Cryptography: -Confidentiality -Integrity -Authentication -Non Repudiation Reviewer:-Raghul Prepared by:-Sandesh S M
  • 2. Types Of Cryptography • Symmetric Cryptography -Uses the same secret key for encryption & decryption of data -Most Widely Used symmetric ciphers are AES & DES -Suitable for large amounts of data -128 bit or larger symmetric keys are common -Can be very fast to use Disadvantage of symmetric cryptography -Not scalable -Non repudiation is possible because everyone has copy of key -Key must be regenerated when anyone leaves the group of keyholders • Asymmetric Cryptography -Two keys are used -Public Key available for anyone -Private key is kept secret -Also know as public key cryptography -RSA,DSA & Diffie-Hellman algorithm are popular examples of asymmetric ciphers -Delivers Confidentiality,Integrity,Autenticity & non repudiation Disadvantage of Asymmetric Cryptography -Slow in processing & requires high processing power -Can’t be decrypted if private key is lost Reviewer:-Raghul Prepared by:-Sandesh S M
  • 3. Cryptosystem or Cipher System A Cryptosystem is an implementation of cryptographic techniques & their accompanying infrastructure to provide information security services. A crypto system is referred to as cipher system Defines key properties,communication requirements for the key exchange,Actions through encryption & decryption process Symmetric Cryptosystems: Reviewer:-Raghul Prepared by:-Sandesh S M
  • 5. Hashes • Process of transforming any given key or string of characters into another value • One way Encryption • Verify the integrity of the message • Verifies Authenticity of message(Proof of origin & non repudiation) • Impossible to recover the original message • Used to store passwords using confidentiality • Message Digest(One way Hash )Functions: Reviewer:-Raghul Prepared by:-Sandesh S M
  • 6. Hashing Algorithms • MD5-Message Digest Function -First Published in April 1992 -Replaced MD4 -Produces 128 bit Hash value • SHA-Secure hash Algorithm -Developed by NSA -Widely Used -Produces 160-bit Hashing • SHA 2-Secure Hash Algorithm 2 -Option to vary digest between 224 bits to 512 bits -Includes SHA-256,SHA-384 & SHA-512 • SHA 3-Secure Hash Algorithm 3 -Uses Hash function keccack -Replaced by SHA 1 & SHA 2