Cryptography

2,126 views

Published on

This Slide is Best suited for event such as Technical Paper Presentation

Published in: Education
1 Comment
0 Likes
Statistics
Notes
  • i cnt download this presentation how can i do????????
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
2,126
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
122
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Cryptography

  1. 1. Nakshatra ‘10<br />“CRYPTOGRAPHY<br />Unlocked”<br />
  2. 2. TECHNICAL PAPER PRESENTATION<br />INTRODUCTION<br /><ul><li>By Definition Cryptography Is The Process Of Converting Recognizable Data Into An Encrypted Code For Transmitting It Over A Network (Either Trusted Or Untrusted).
  3. 3. Data Is Encrypted At The Source, I.E. Sender's End And Decrypted At The Destination, I.E. Receiver's End.</li></ul>Nakshatra ‘10<br />
  4. 4. TECHNICAL PAPER PRESENTATION<br />THE PURPOSE<br /><ul><li>Authentication
  5. 5. Privacy/confidentiality
  6. 6. Integrity
  7. 7. Non-repudiation</li></ul>Nakshatra ‘10<br />
  8. 8. TECHNICAL PAPER PRESENTATION<br />In General Cryptographic Algorithms Are Classified Into Three Categories As Follows :<br /><ul><li>Secret Key Cryptography (SKC)
  9. 9. Public Key Cryptography (PKC)
  10. 10. Hash Functions</li></ul>Nakshatra ‘10<br />
  11. 11. TECHNICAL PAPER PRESENTATION<br />SECRET KEY <br />CRYPTOGRAPHY<br /><ul><li>Data Encryption Standard (DES)
  12. 12. Advanced Encryption Standard (AES )
  13. 13. International Data Encryption Algorithm (IDEA)
  14. 14. Rivest Ciphers
  15. 15. Blowfish</li></ul>Nakshatra ‘10<br />
  16. 16. TECHNICAL PAPER PRESENTATION<br />PUBLIC - KEY<br />CRYPTOGRAPHY <br /><ul><li>In PKC, one of the keys is designated the public key and may be advertised as widely as the owner wants. The other key is designated the private key and is never revealed to another party.</li></ul>RSA <br /><ul><li>One of the most popular encryption algorithm, invented in 1977 by three MIT scientists (Ronald Rivest, Adi Shamir, and Leonard Adleman)</li></ul>Nakshatra ‘10<br />
  17. 17. TECHNICAL PAPER PRESENTATION<br />Hash Functions<br /><ul><li>Message Digest (MD) algorithms</li></ul>MD2 : Designed for systems with limited memory, such as smart cards.<br />MD4 : Developed by Rivest, similar to MD2 but designed specifically for fast processing in software.<br />MD5 : It accepts variable length message from the user and converts it into a fixed 128-bit message digest value.<br />Nakshatra ‘10<br />
  18. 18. TECHNICAL PAPER PRESENTATION<br /><ul><li>Secure Hash Algorithm (SHA)</li></ul>Algorithm for nist's secure hash standard (SHS). SHA-1 produces a 160-bit hash value and was originally published as FIPS 180-1 and RFC 3174. FIPS 180-2 describes five algorithms in the SHS: SHA-1 plus SHA-224, SHA-256, SHA-384, and SHA-512 which can produce hash values that are 224, 256, 384, or 512 bits in length, respectively. SHA-224, -256, -384, and -52 are also described in RFC 4634.<br />Nakshatra ‘10<br />
  19. 19. TECHNICAL PAPER PRESENTATION<br /><ul><li>RIPEMD</li></ul>A series of message digests that initially came from the RIPE (RACE integrity primitives evaluation) project. RIPEMD-160 was designed by Hans Dobbertin, AntoonBosselaers, And Bart Preneel, and optimized for 32-bit processors to replace the then-current 128-bit hash functions. Other versions include RIPEMD-256, RIPEMD-320, and RIPEMD-128. <br />Nakshatra ‘10<br />
  20. 20. TECHNICAL PAPER PRESENTATION<br /><ul><li>HAVAL (HAsh of VAriable Length)</li></ul>Designed by Y. Zheng, J. Pieprzyk and J. Seberry, a hash algorithm with many levels of security. HAVAL can create hash values that are 128, 160, 192, 224, or 256 bits in length.<br />Nakshatra ‘10<br />
  21. 21. TECHNICAL PAPER PRESENTATION<br /><ul><li>WHIRLPOOL</li></ul>A relatively new hash function, designed by V. Rijmen and P.S.L.M. Barreto. Whirlpool operates on messages less than 2256 bits in length, and produces A message digest of 512 bits. The design of this hash function is very different than that of MD5 and SHA-1, making it immune to the same attacks as on those hashes.<br />Nakshatra ‘10<br />
  22. 22. TECHNICAL PAPER PRESENTATION<br /><ul><li>TIGER</li></ul>Designed by Ross Anderson and Eli Biham, Tiger is designed to be secure, run efficiently on 64-bit processors, and easily replace MD4, MD5, SHA and SHA-1 in other applications. Tiger/192 produces a 192-bit output and is compatible with 64-bit architectures; Tiger/128 and Tiger/160 produce the first 128 and 160 bits, respectively, to provide compatibility with the other hash functions.<br />Nakshatra ‘10<br />
  23. 23. TECHNICAL PAPER PRESENTATION<br />CONCLUSION<br /><ul><li> In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful.
  24. 24. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared key known only between the two communicating hosts.
  25. 25. This shared key is used both for the encryption as well as the decryption of data. </li></ul>Nakshatra ‘10<br />
  26. 26. TECHNICAL PAPER PRESENTATION<br />REFERENCE<br />INTERNET SOURCE :<br />www.wiki.org<br />www.insecure.com<br />BOOK SOURCE :<br />Computer Security (Tech – Max Publication)<br />Nakshatra ‘10<br />
  27. 27. TECHNICAL PAPER PRESENTATION<br />QUESTION & ANSWER<br />THANK YOU<br />Nakshatra ‘10<br />

×