SlideShare a Scribd company logo
1 of 11
Made By:
Amit Kaur
Anjali Jindal
Amandeep Singh
Aishwarya Mehta
Anu Aggarwal
 Cryptography derived its name from a
Greek word called “Kryptos” which means
“Hidden Secrets”.
 Cryptography is the science and art of
transforming messages to make them
secure and immune to attack.
 It provides Confidentiality, Integrity,
Accuracy.
 Confidentiality is the fundamental security service
provided by cryptography. It is a security service that
keeps the information from an unauthorized person. It is
sometimes referred to as privacy or secrecy.
 Data integrity cannot prevent the alteration of data, but
provides a means for detecting whether data has been
manipulated in an unauthorized manner
 Authentication provides the identification of the
originator. It confirms to the receiver that the data received
has been sent only by an identified and verified sender.
 Plaintext. It is the data to be protected during transmission.
 Encryption Algorithm. It is a mathematical process that produces a
ciphertext for any given plaintext and encryption key
 Ciphertext. It is the scrambled version of the plaintext produced by
the encryption algorithm using a specific the encryption key.
 Decryption Algorithm, It is a mathematical process, that produces a
unique plaintext for any given ciphertext and decryption key The
decryption algorithm essentially reverses the encryption algorithm
and is thus closely related to it.
 Encryption Key. It is a value that is known to the sender. The sender inputs the
encryption key into the encryption algorithm along with the plaintext in order
to compute the ciphertext.
 Decryption Key. It is a value that is known to the receiver. The decryption key
is related to the encryption key, but is not always identical to it. The receiver
inputs the decryption key into the decryption algorithm along with the
ciphertext in order to compute the plaintext.
 An interceptor (an attacker) is an unauthorized entity who attempts to
determine the plaintext.
 Asymmetric Key
Cryptography
 Symmetric Key
Cryptography
 Also known as secret key. Sender & receiver uses
same key & an encryption/decryption algorithm to
encrypt/decrypt data. i.e. the key is shared.
◦ Advantages
 Simpler and Faster
◦ Disadvantages
 Less Secured
 Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC &
PRIVATE respectively.
◦ Advantages
 More Secured
 Authentication
◦ Disadvantages
 Relatively Complex
 An approach in which each user has two related a
public and a private
 One's public key is distributed freely
 A person encrypts an outgoing message, using the
receiver's public key.
 Only the receiver's private key can decrypt the
message.
 By using of encryption techniques a fair unit
of confidentiality, authentication, integrity,
access control and availability of data is
maintained.

More Related Content

What's hot

Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemMerlin Florrence
 
fucking shit
fucking shitfucking shit
fucking shiteyalrav
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distributionMazin Alwaaly
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyRajKumar Rampelli
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoEleanor McHugh
 

What's hot (20)

Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Encryption
EncryptionEncryption
Encryption
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Encryption
EncryptionEncryption
Encryption
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
 
fucking shit
fucking shitfucking shit
fucking shit
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Information and data security key management and distribution
Information and data security key management and distributionInformation and data security key management and distribution
Information and data security key management and distribution
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Hybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and GoHybrid Cryptography with examples in Ruby and Go
Hybrid Cryptography with examples in Ruby and Go
 

Viewers also liked

Culture,political and legal environment
Culture,political and legal environmentCulture,political and legal environment
Culture,political and legal environmentdesire120
 
Journey Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and ArchivingJourney Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and ArchivingAmazon Web Services
 
Systematic approach to training
Systematic approach to trainingSystematic approach to training
Systematic approach to trainingdesire120
 
10 11 webinar e procurement 1 3 buying made easy_final
10 11  webinar e procurement 1 3 buying made easy_final10 11  webinar e procurement 1 3 buying made easy_final
10 11 webinar e procurement 1 3 buying made easy_finalOpusCapita
 
aquaria construction design and management ( a brief overview) Journal
aquaria construction design and management ( a brief overview) Journalaquaria construction design and management ( a brief overview) Journal
aquaria construction design and management ( a brief overview) JournalFamous-Cole Abraham
 
T&d chap001
T&d chap001T&d chap001
T&d chap001desire120
 
Systematic approach to training
Systematic approach to trainingSystematic approach to training
Systematic approach to trainingdesire120
 
【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議
【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議
【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議Ariel Cheng
 
How AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueHow AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueAmazon Web Services
 
KPTとKPTA
KPTとKPTAKPTとKPTA
KPTとKPTAESM SEC
 
俺も!KPTA 公開用
俺も!KPTA 公開用俺も!KPTA 公開用
俺も!KPTA 公開用ESM SEC
 
The use of opinion polls data in the Arab Human Development Report 2016
The use of opinion polls data in the Arab Human Development Report 2016The use of opinion polls data in the Arab Human Development Report 2016
The use of opinion polls data in the Arab Human Development Report 2016Economic Research Forum
 
Instrumental Variables and Control Functions
Instrumental Variables and Control FunctionsInstrumental Variables and Control Functions
Instrumental Variables and Control FunctionsEconomic Research Forum
 
20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり
20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり
20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょりGyori Nagafuchi
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudTom Laszewski
 
Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganDevelop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganAmazon Web Services
 

Viewers also liked (17)

Culture,political and legal environment
Culture,political and legal environmentCulture,political and legal environment
Culture,political and legal environment
 
Journey Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and ArchivingJourney Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and Archiving
 
Systematic approach to training
Systematic approach to trainingSystematic approach to training
Systematic approach to training
 
10 11 webinar e procurement 1 3 buying made easy_final
10 11  webinar e procurement 1 3 buying made easy_final10 11  webinar e procurement 1 3 buying made easy_final
10 11 webinar e procurement 1 3 buying made easy_final
 
aquaria construction design and management ( a brief overview) Journal
aquaria construction design and management ( a brief overview) Journalaquaria construction design and management ( a brief overview) Journal
aquaria construction design and management ( a brief overview) Journal
 
T&d chap001
T&d chap001T&d chap001
T&d chap001
 
Systematic approach to training
Systematic approach to trainingSystematic approach to training
Systematic approach to training
 
【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議
【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議
【大學報PM2.5專題四】雲林空污:中央vs.地方法規爭議
 
How AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueHow AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and Revenue
 
KPTとKPTA
KPTとKPTAKPTとKPTA
KPTとKPTA
 
俺も!KPTA 公開用
俺も!KPTA 公開用俺も!KPTA 公開用
俺も!KPTA 公開用
 
The use of opinion polls data in the Arab Human Development Report 2016
The use of opinion polls data in the Arab Human Development Report 2016The use of opinion polls data in the Arab Human Development Report 2016
The use of opinion polls data in the Arab Human Development Report 2016
 
Causal Inference and Program Evaluation
Causal Inference and Program EvaluationCausal Inference and Program Evaluation
Causal Inference and Program Evaluation
 
Instrumental Variables and Control Functions
Instrumental Variables and Control FunctionsInstrumental Variables and Control Functions
Instrumental Variables and Control Functions
 
20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり
20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり
20161111 re:Work meetupYamagata2016 酒と仕事とテレワークとぎょり
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
 
Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris MerriganDevelop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
Develop an Enterprise-wide Cloud Adoption Strategy – Chris Merrigan
 

Similar to Cryptography

PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
cryptography
cryptographycryptography
cryptographyswatihans
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxMohamedNowfeek1
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfVAIBHAVCHAKRAWARTI
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks insAstha Parihar
 

Similar to Cryptography (20)

PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Ccn
CcnCcn
Ccn
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
cryptography
cryptographycryptography
cryptography
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 

More from desire120

Recruitment and section can be evaluated by using the following questionnaire
Recruitment and section can be evaluated by using the following questionnaireRecruitment and section can be evaluated by using the following questionnaire
Recruitment and section can be evaluated by using the following questionnairedesire120
 
Rights and duties of agents
Rights and duties of agentsRights and duties of agents
Rights and duties of agentsdesire120
 
The role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovationThe role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovationdesire120
 
Technology export
Technology exportTechnology export
Technology exportdesire120
 
Technology acquisition & absorption
Technology acquisition & absorptionTechnology acquisition & absorption
Technology acquisition & absorptiondesire120
 
Fund flow statement
Fund flow statementFund flow statement
Fund flow statementdesire120
 
Assignments mba ii_ird_semester
Assignments mba ii_ird_semesterAssignments mba ii_ird_semester
Assignments mba ii_ird_semesterdesire120
 
Hrm unit i ii-iii_iv
Hrm unit i ii-iii_ivHrm unit i ii-iii_iv
Hrm unit i ii-iii_ivdesire120
 
Training techneiques
Training techneiquesTraining techneiques
Training techneiquesdesire120
 
Training and development
Training and developmentTraining and development
Training and developmentdesire120
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 

More from desire120 (14)

Recruitment and section can be evaluated by using the following questionnaire
Recruitment and section can be evaluated by using the following questionnaireRecruitment and section can be evaluated by using the following questionnaire
Recruitment and section can be evaluated by using the following questionnaire
 
Rights and duties of agents
Rights and duties of agentsRights and duties of agents
Rights and duties of agents
 
The role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovationThe role of foreign technology and indigenous innovation
The role of foreign technology and indigenous innovation
 
Technology export
Technology exportTechnology export
Technology export
 
Technology acquisition & absorption
Technology acquisition & absorptionTechnology acquisition & absorption
Technology acquisition & absorption
 
Mtic
MticMtic
Mtic
 
Fund flow statement
Fund flow statementFund flow statement
Fund flow statement
 
Assignments mba ii_ird_semester
Assignments mba ii_ird_semesterAssignments mba ii_ird_semester
Assignments mba ii_ird_semester
 
Hrm unit i ii-iii_iv
Hrm unit i ii-iii_ivHrm unit i ii-iii_iv
Hrm unit i ii-iii_iv
 
Unit 1
Unit 1Unit 1
Unit 1
 
Training
TrainingTraining
Training
 
Training techneiques
Training techneiquesTraining techneiques
Training techneiques
 
Training and development
Training and developmentTraining and development
Training and development
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Cryptography

  • 1. Made By: Amit Kaur Anjali Jindal Amandeep Singh Aishwarya Mehta Anu Aggarwal
  • 2.  Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”.  Cryptography is the science and art of transforming messages to make them secure and immune to attack.  It provides Confidentiality, Integrity, Accuracy.
  • 3.  Confidentiality is the fundamental security service provided by cryptography. It is a security service that keeps the information from an unauthorized person. It is sometimes referred to as privacy or secrecy.  Data integrity cannot prevent the alteration of data, but provides a means for detecting whether data has been manipulated in an unauthorized manner  Authentication provides the identification of the originator. It confirms to the receiver that the data received has been sent only by an identified and verified sender.
  • 4.
  • 5.  Plaintext. It is the data to be protected during transmission.  Encryption Algorithm. It is a mathematical process that produces a ciphertext for any given plaintext and encryption key  Ciphertext. It is the scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key.  Decryption Algorithm, It is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key The decryption algorithm essentially reverses the encryption algorithm and is thus closely related to it.
  • 6.  Encryption Key. It is a value that is known to the sender. The sender inputs the encryption key into the encryption algorithm along with the plaintext in order to compute the ciphertext.  Decryption Key. It is a value that is known to the receiver. The decryption key is related to the encryption key, but is not always identical to it. The receiver inputs the decryption key into the decryption algorithm along with the ciphertext in order to compute the plaintext.  An interceptor (an attacker) is an unauthorized entity who attempts to determine the plaintext.
  • 7.  Asymmetric Key Cryptography  Symmetric Key Cryptography
  • 8.  Also known as secret key. Sender & receiver uses same key & an encryption/decryption algorithm to encrypt/decrypt data. i.e. the key is shared. ◦ Advantages  Simpler and Faster ◦ Disadvantages  Less Secured
  • 9.  Also known as public key cryptography. Sender & receiver uses different keys for encryption & decryption namely PUBLIC & PRIVATE respectively. ◦ Advantages  More Secured  Authentication ◦ Disadvantages  Relatively Complex
  • 10.  An approach in which each user has two related a public and a private  One's public key is distributed freely  A person encrypts an outgoing message, using the receiver's public key.  Only the receiver's private key can decrypt the message.
  • 11.  By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained.

Editor's Notes

  1. Also known as public key cryptography. Sender & receiver uses different keys for encryption & decryption namely PUBLIC & PRIVATE respectively.