SlideShare a Scribd company logo
1 of 10
What is Cryptography?
Cryptography derived its name from a
Greek word called “Kryptos” which means
“Hidden Secrets”.
Cryptography is the practice and study of
hiding information. It is the Art or Science
of converting a plain intelligible data into
an unintelligible data and again
retransforming that message into its
original form.
It provides Confidentiality, Integrity,
Authentication.
 There are three eras in the history of Cryptography:
 The Manual era
 The Mechanical era
 The Modern era
 Manual era refers to Pen and Paper Cryptography and dates back to 2000 B.C.eg :
Scytale, Atbash , Caesar, Vigenere.
 Mechanical era refers to the invention of cipher machines. E.g.: Japanese Red and
Purple Machines , German Enigma.
 The modern era of cryptography refers to computers.
 There are infinite permutations of cryptography available using computers. E.g.: Lucifer,
Rijndael , RSA , ElGamal.
2
What is Encryption / Decryption
 Encryption –
 The process of converting plain text into an unintelligible format (cipher text)
is called Encryption.
 Decryption –
 The process of converting cipher text into a plain text is called Decryption.
Cryptography
Symmetric key Asymmetric key
cryptography cryptography
(Public key
cryptography)
Classical Modern
cryptography cryptography
Transposition Substitution Stream Block
cipher cipher cipher cipher
4
Symmetric
o Even if an attacker captures the data, the attacker
will not be able to manipulate it in any meaningful
way.
o Symmetric algorithms use a single key shared by
two communicating parties.
o The same key is used for both encryption and
decryption.
Classic or Symmetric Cryptography
•have two basic components of
classical ciphers: substitution and
transposition
•in substitution ciphers letters
are replaced by other letters
•in transposition ciphers the
letters are arranged in a different
order.
Example:
 “Hello world” becomes “ehlol owrdl” is a trivally is a
simple rearrangement schemes.
Asymmetric
oMathematically related key
pairs for encryption and
decryption.
oPublic and private keys.
PUBLIC KEY or Assymmatric CRYPTOGRAPHY
 A form of cryptography in which the key used to encrypt a
message differs from the key used to decrypt it.
 In public key cryptography, a user has a pair of cryptographic
keys—a public key and a private key. The private key is kept
secret, while the public key may be widely distributed.
 The two main branches of public key cryptography are:
1. Public key encryption
2. Digital signatures
Ccn presentation

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptographyprasham95
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Cryptography
CryptographyCryptography
CryptographyPPT4U
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Cryptography
CryptographyCryptography
CryptographyAskme.com
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Itt project
Itt projectItt project
Itt project
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography
CryptographyCryptography
Cryptography
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Viewers also liked

Week 1 project (corrected)
Week 1 project (corrected)Week 1 project (corrected)
Week 1 project (corrected)Anthony Clay
 
Giacomo Leopardi: le fasi del pessimismo
Giacomo Leopardi: le fasi del pessimismoGiacomo Leopardi: le fasi del pessimismo
Giacomo Leopardi: le fasi del pessimismoMartinaGiommo
 
FIRA 2016 : Philippe Jeanneaux, VetAggro Sup
FIRA 2016 : Philippe Jeanneaux, VetAggro SupFIRA 2016 : Philippe Jeanneaux, VetAggro Sup
FIRA 2016 : Philippe Jeanneaux, VetAggro SupNaïo Technologies
 
FIRA 2016: Naïo Technologies Keynote
FIRA 2016: Naïo Technologies KeynoteFIRA 2016: Naïo Technologies Keynote
FIRA 2016: Naïo Technologies KeynoteNaïo Technologies
 
Passivereasons
PassivereasonsPassivereasons
Passivereasonsholly_cin
 
Resumen Libro Cadena Critica Gold Ratt
Resumen Libro Cadena Critica Gold RattResumen Libro Cadena Critica Gold Ratt
Resumen Libro Cadena Critica Gold RattCarlos Osorio Gamarra
 
Object calisthenics (PyCon Poland 2016)
Object calisthenics (PyCon Poland 2016)Object calisthenics (PyCon Poland 2016)
Object calisthenics (PyCon Poland 2016)Paweł Lewtak
 

Viewers also liked (13)

Formar y educar para la vida
Formar y educar para la vidaFormar y educar para la vida
Formar y educar para la vida
 
Week 1 project (corrected)
Week 1 project (corrected)Week 1 project (corrected)
Week 1 project (corrected)
 
1
11
1
 
Delitos contra la familia
Delitos contra la familiaDelitos contra la familia
Delitos contra la familia
 
1
11
1
 
Introduccion a TOC
Introduccion a TOCIntroduccion a TOC
Introduccion a TOC
 
Giacomo Leopardi: le fasi del pessimismo
Giacomo Leopardi: le fasi del pessimismoGiacomo Leopardi: le fasi del pessimismo
Giacomo Leopardi: le fasi del pessimismo
 
Presentación uvaq
Presentación uvaqPresentación uvaq
Presentación uvaq
 
FIRA 2016 : Philippe Jeanneaux, VetAggro Sup
FIRA 2016 : Philippe Jeanneaux, VetAggro SupFIRA 2016 : Philippe Jeanneaux, VetAggro Sup
FIRA 2016 : Philippe Jeanneaux, VetAggro Sup
 
FIRA 2016: Naïo Technologies Keynote
FIRA 2016: Naïo Technologies KeynoteFIRA 2016: Naïo Technologies Keynote
FIRA 2016: Naïo Technologies Keynote
 
Passivereasons
PassivereasonsPassivereasons
Passivereasons
 
Resumen Libro Cadena Critica Gold Ratt
Resumen Libro Cadena Critica Gold RattResumen Libro Cadena Critica Gold Ratt
Resumen Libro Cadena Critica Gold Ratt
 
Object calisthenics (PyCon Poland 2016)
Object calisthenics (PyCon Poland 2016)Object calisthenics (PyCon Poland 2016)
Object calisthenics (PyCon Poland 2016)
 

Similar to Ccn presentation

Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jhaManishaJha43
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 

Similar to Ccn presentation (20)

Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
cryptography
cryptographycryptography
cryptography
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Ccn presentation

  • 1. What is Cryptography? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Authentication.
  • 2.  There are three eras in the history of Cryptography:  The Manual era  The Mechanical era  The Modern era  Manual era refers to Pen and Paper Cryptography and dates back to 2000 B.C.eg : Scytale, Atbash , Caesar, Vigenere.  Mechanical era refers to the invention of cipher machines. E.g.: Japanese Red and Purple Machines , German Enigma.  The modern era of cryptography refers to computers.  There are infinite permutations of cryptography available using computers. E.g.: Lucifer, Rijndael , RSA , ElGamal. 2
  • 3. What is Encryption / Decryption  Encryption –  The process of converting plain text into an unintelligible format (cipher text) is called Encryption.  Decryption –  The process of converting cipher text into a plain text is called Decryption.
  • 4. Cryptography Symmetric key Asymmetric key cryptography cryptography (Public key cryptography) Classical Modern cryptography cryptography Transposition Substitution Stream Block cipher cipher cipher cipher 4
  • 5. Symmetric o Even if an attacker captures the data, the attacker will not be able to manipulate it in any meaningful way. o Symmetric algorithms use a single key shared by two communicating parties. o The same key is used for both encryption and decryption.
  • 6. Classic or Symmetric Cryptography •have two basic components of classical ciphers: substitution and transposition •in substitution ciphers letters are replaced by other letters •in transposition ciphers the letters are arranged in a different order.
  • 7. Example:  “Hello world” becomes “ehlol owrdl” is a trivally is a simple rearrangement schemes.
  • 8. Asymmetric oMathematically related key pairs for encryption and decryption. oPublic and private keys.
  • 9. PUBLIC KEY or Assymmatric CRYPTOGRAPHY  A form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it.  In public key cryptography, a user has a pair of cryptographic keys—a public key and a private key. The private key is kept secret, while the public key may be widely distributed.  The two main branches of public key cryptography are: 1. Public key encryption 2. Digital signatures

Editor's Notes

  1. The history of cryptography begins where many stories of history do…. in ancient Egypt with hieroglyphics. Scytale – Spartan method involved wrapping a belt around a rod of a given diameter and length Atbash – Hewbrew cipher which mirrored the normal alphabet (shown in The DaVinci Code) Caesar – Shift all letters by a given number of letters in the alphabet Vignère – Use of a key and multiple alphabets to hide repeated characters in an encrypted message