DATA64 - CRYPTOLOGY

443 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
443
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DATA64 - CRYPTOLOGY

  1. 1. Cryptography and Digital Signatures Deciphering the concept behind Cryptology and its applications Presented By: [ Catalyst ]
  2. 2. Cryptology • Cryptography. • Cryptanalysis. Confidentiality. Data integrity. Authentication. Non-repudiation Why do we need such operations on the Data ???
  3. 3. Cryptography • Plain Text  Unencrypted Data • Cipher Text  Encrypted Data • Keys  Decrypt Data Plain Text Key Cipher Text + Security ?? Algorithm Strength. Key Secrecy.
  4. 4. Cryptography • Encryption. • Decryption. Cipher TextPlain Text Input KEYS
  5. 5. Types of Cryptography Symmetric Cryptography Asymmetric Cryptography KEYS ? Very Large Numbers Length is measeared in Bits
  6. 6. Symmetric Cryptography • Use of same Key. • Requires only one key • Also called Secret key Cryptography. Ex: DES, IDEA , Blowfish. • Very Fast CATALYST {Plaintext} ROT13 {Key} ROT13 {Key} PNGNYLFG {Encrypted Message } + E n c r y p t i o n + Decryption D e c r y p t i o n
  7. 7. Asymmetric Cryptography • Public-key Cryptography. • Uses pair of cryptographic Keys ! • These keys have mathematical relation. • To encrypt Plaintext & verify Signature  Public key is used. • Decrypt cipher text & create Digital Signature  Private key is Used. • Functions are inverse of each other. • It is not possible to Determine a private key from a public key. • Ex : RSA , ElGamal , DSS Public Key Private Key
  8. 8. ############HASH############# • It is an Algorithm. • One way Encryption. • Maps Data . • Generate fixed length Output Data • The output is called Hash Value/Hashes. • Easy to compute the hash value for any given message • It is infeasible to generate a message that has a given hash. • It is infeasible to modify a message without changing the hash. • It is infeasible to find two different messages with the same hash. • Used to verify Integrity of file or messages. • Password Verification. • Ex : MD5, SHA1, SHA2, PANAMA , Gost
  9. 9. DIGITAL SIGNATURES
  10. 10. Digital Signatures

×