SlideShare a Scribd company logo
1 of 21
SECURITY 
SECURITY THREATS 
SECURITY GOALS 
WHAT IS CRYPTOGRAPHY 
BASIC TERMS 
ENCRYPTION & DECRYPTION 
CATEGORIES OF CRYPTOGRAPHY 
COMPARISON 
CONCLUSION
SECURITY??? 
Network security is an over arching term.
1. Passive threats 
2. Active threats
 PLAIN TEXT 
 CIPHER TEXT 
 CIPHER 
 ENCRIPTION & DECRYPTION 
 KEYS
A. Symmetric cryptography 
B. Asymmetric cryptography
SYMMETRIC KEY CRYPTOGRAPHY 
o also known as secret key cryptography. 
o Sender & receiver uses same key for 
encryption & decryption namely public key
a. Traditional cipher 
b. Modern cipher 
Two types traditional cipher 
i. Substitution cipher 
ii. Transposition cipher
A substitutional cipher is one in which the 
letters/numbers/symbols is replaced by other 
letters/numbers/symbols 
e.g 
A d, t z 
2 5, 3 6
 Also known as public key 
 Sender and receiver uses 
 different keys for encryption and 
 decryption namely public & private key
COMPARISON 
Symmetric key cryptography Asymmetric key cryptography 
1. The same algorithm with 
same key is used for 
encryption & decryption 
2. The key must be kept 
secret 
3. may be impossible or at 
least impractical to 
decipher a message if no 
other information is given 
1. One algorithm is used for 
encryption & other for 
decryption with a pair of 
keys respectively 
2. One of the key must be 
kept secret 
3. It may be impossible or at 
least impractical to 
decipher a message if no 
other information is given
• Defense services 
• Secure data manipulation 
• Business transactions 
• Internet payment systems 
• User identification systems 
• Acess control 
• Data security
 By using of encryption techniques ,a fair unit of 
confidentiality,authentication,integrity,acess control and 
availability of data is maintained
thanks

More Related Content

What's hot

What's hot (18)

Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTCryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Criptography
CriptographyCriptography
Criptography
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Group 6
Group 6Group 6
Group 6
 
Cryptography
CryptographyCryptography
Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Ccn

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxKuntalSasmal1
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
cryptography
cryptographycryptography
cryptographyswatihans
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jhaManishaJha43
 
PresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxPresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxHRockyAman
 

Similar to Ccn (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
cryptography
cryptographycryptography
cryptography
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
PresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptxPresentationonCRYPTOGRAPHY.pptx
PresentationonCRYPTOGRAPHY.pptx
 

Ccn

  • 1.
  • 2. SECURITY SECURITY THREATS SECURITY GOALS WHAT IS CRYPTOGRAPHY BASIC TERMS ENCRYPTION & DECRYPTION CATEGORIES OF CRYPTOGRAPHY COMPARISON CONCLUSION
  • 3. SECURITY??? Network security is an over arching term.
  • 4. 1. Passive threats 2. Active threats
  • 5.
  • 6.
  • 7.  PLAIN TEXT  CIPHER TEXT  CIPHER  ENCRIPTION & DECRYPTION  KEYS
  • 8.
  • 9. A. Symmetric cryptography B. Asymmetric cryptography
  • 10. SYMMETRIC KEY CRYPTOGRAPHY o also known as secret key cryptography. o Sender & receiver uses same key for encryption & decryption namely public key
  • 11.
  • 12. a. Traditional cipher b. Modern cipher Two types traditional cipher i. Substitution cipher ii. Transposition cipher
  • 13. A substitutional cipher is one in which the letters/numbers/symbols is replaced by other letters/numbers/symbols e.g A d, t z 2 5, 3 6
  • 14.
  • 15.  Also known as public key  Sender and receiver uses  different keys for encryption and  decryption namely public & private key
  • 16.
  • 17.
  • 18. COMPARISON Symmetric key cryptography Asymmetric key cryptography 1. The same algorithm with same key is used for encryption & decryption 2. The key must be kept secret 3. may be impossible or at least impractical to decipher a message if no other information is given 1. One algorithm is used for encryption & other for decryption with a pair of keys respectively 2. One of the key must be kept secret 3. It may be impossible or at least impractical to decipher a message if no other information is given
  • 19. • Defense services • Secure data manipulation • Business transactions • Internet payment systems • User identification systems • Acess control • Data security
  • 20.  By using of encryption techniques ,a fair unit of confidentiality,authentication,integrity,acess control and availability of data is maintained