SlideShare a Scribd company logo
1 of 9
By Kajal Chaudhari
Roll No.: 30
Cryptography in networks.
• Cryptography derived its name from a Greek word
called “Kryptos” which means “Hidden Secrets”.
• Cryptography is a method of storing and transmitting
data in a particular form so that only those for whom it
is intended can read and process it.
• The term is most often associated with scrambling
plaintext (ordinary text) into cipher text (a process
called encryption), then back again (known as
decryption).
What is cryptography?
Bob Alice
Types of Cryptography
(Secret key) (Public key)
Asymmetric key cryptography: (Public key)
• Two different keys are used for encryption
and decryption.
• More secured, relatively complex
Symmetric key cryptography (private key)
• Only one key is used for encryption and decryption
• It is simple and faster
• Less secured
Purpose of cryptography
• Defending against external/internal
hackers
• Securing E-commerce
• Securing bank accounts/electronic
transfer
• Securing intellectual property
• Avoiding liability
Thank you!!

More Related Content

What's hot

Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSeokgu Yun
 
How your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain spaceHow your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain spaceMichał Załęcki
 
REST project brief - typical setup for teams
REST project brief - typical setup for teamsREST project brief - typical setup for teams
REST project brief - typical setup for teamsDian Swanepoel
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careJessica C. Gardner
 
Handshake with HTTPS
Handshake with HTTPSHandshake with HTTPS
Handshake with HTTPSRafiul Islam
 
Handshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul IslamHandshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul IslamCefalo
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquespreetikapri1
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project reviewAmit Debnath
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography pptGowarthini
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 

What's hot (20)

DTU HTS 2017 - some take aways...
DTU HTS 2017 - some take aways...DTU HTS 2017 - some take aways...
DTU HTS 2017 - some take aways...
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet Network
 
How your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain spaceHow your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain space
 
REST project brief - typical setup for teams
REST project brief - typical setup for teamsREST project brief - typical setup for teams
REST project brief - typical setup for teams
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should care
 
Handshake with HTTPS
Handshake with HTTPSHandshake with HTTPS
Handshake with HTTPS
 
Handshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul IslamHandshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul Islam
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
HTTPS
HTTPSHTTPS
HTTPS
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Encryption
Encryption Encryption
Encryption
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project review
 
How encryption work
How encryption workHow encryption work
How encryption work
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 

Viewers also liked

Quý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tếtQuý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tếttosha456
 
Education and poverty in florida
Education and poverty in floridaEducation and poverty in florida
Education and poverty in floridaGiang Trinh
 
maglev train
maglev trainmaglev train
maglev train007skpk
 
hybrid electric vehicle
hybrid electric vehiclehybrid electric vehicle
hybrid electric vehicle007skpk
 
Data transmission rate and bandwidth
Data transmission rate and bandwidth Data transmission rate and bandwidth
Data transmission rate and bandwidth Kajal Chaudhari
 
A seminar report on maglev train
A seminar report on maglev trainA seminar report on maglev train
A seminar report on maglev train007skpk
 
Modern-Day Slavery
Modern-Day SlaveryModern-Day Slavery
Modern-Day SlaveryGiang Trinh
 
A seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicleA seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicle007skpk
 

Viewers also liked (10)

Quý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tếtQuý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tết
 
Education and poverty in florida
Education and poverty in floridaEducation and poverty in florida
Education and poverty in florida
 
Apostila vba excel
Apostila vba excelApostila vba excel
Apostila vba excel
 
Apostila de economia_i
Apostila de economia_iApostila de economia_i
Apostila de economia_i
 
maglev train
maglev trainmaglev train
maglev train
 
hybrid electric vehicle
hybrid electric vehiclehybrid electric vehicle
hybrid electric vehicle
 
Data transmission rate and bandwidth
Data transmission rate and bandwidth Data transmission rate and bandwidth
Data transmission rate and bandwidth
 
A seminar report on maglev train
A seminar report on maglev trainA seminar report on maglev train
A seminar report on maglev train
 
Modern-Day Slavery
Modern-Day SlaveryModern-Day Slavery
Modern-Day Slavery
 
A seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicleA seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicle
 

Similar to Cryptography in networks

Similar to Cryptography in networks (20)

Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Ccn
CcnCcn
Ccn
 
Ccn
CcnCcn
Ccn
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Cryptography in networks

  • 1. By Kajal Chaudhari Roll No.: 30 Cryptography in networks.
  • 2. • Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. • Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. • The term is most often associated with scrambling plaintext (ordinary text) into cipher text (a process called encryption), then back again (known as decryption). What is cryptography?
  • 4.
  • 5. Types of Cryptography (Secret key) (Public key)
  • 6. Asymmetric key cryptography: (Public key) • Two different keys are used for encryption and decryption. • More secured, relatively complex
  • 7. Symmetric key cryptography (private key) • Only one key is used for encryption and decryption • It is simple and faster • Less secured
  • 8. Purpose of cryptography • Defending against external/internal hackers • Securing E-commerce • Securing bank accounts/electronic transfer • Securing intellectual property • Avoiding liability