6. C R Y P T O G R A P H Y
Key Words
Plain Text :- It is the simple text.
Cipher Text :- It is the coded text.
Encryption :- Converting plain text into
Cipher text.
Decryption :- Converting back from Cipher
text into Plain text.
(Ex. Hello)
(Ex. lkjne)
7. C R Y P T O G R A P H Y
Defination
It is the practice and study of
techniques for secure
communication of data.
This system is called Cryptosystem.
9. Ancient History
Pioneer of Cryptography :- Julius Caesar
Birth :- 100 BC
Country :- Rome
Invention :- Shift Cipher method
10. Ancient History
Started in Egypt in 3000 B.C.
They found it very complicate due to
insufficient knowledge of Mathematics
& Cryptography.
Finally they had to stop it…
11. Ancient History
Weakness of Shift Cipher :- Any one can decrypt it easily
Well known example of…
Mary Queen of Scot
Queen Elizabeth I
c
c
12. Modern History
(Zimmermann’s Telegram)
Sent by Arthur Zimmermann, the
foreign secretary of Germany on
11/01/1917.
United States entered into
World War - I
It was intercepted and decoded
by British Intelligence.
13. In 20th Century…
Invented by Arthur Scherbius at
the end of World War I.
Intention:- To Encode and decode
of Ciphers.
Adopted by Military and Govt.
First broken by Polish Cipher
Bureau in Dec.1932 by using
Theoretical Mathematics and
Reverse Engineering.
Enigma Machine
14. In 21th Century…
After the end of World War II, the Encryption
and Decryption has shifted from ….
15. In 21th Century…
Parallel to the development of…
…advance methods in Cryptography were developed.
Shift Cipher
DES Cipher RSA Cipher
Permutation Cipher
DH Secret key exchange method
18. How did they do it…???
They use a method called…
CEASAR CIPHER
19. CEASAR CIPHER
One of the simplest and widely known
encryption technique.
Named after Julius Caesar.
He used it in his private
communication.
This method is also known as
Shift Cipher or Ceaser’s Code.
21. CEASAR CIPHER
How to convert a text into Cipher Code?
Step -1 :- Remove space, comma(,) , dot(.), “ “,
etc.
and write a simple sentence.
Step -2 :- Replace numbers by alphabets.
ex. 5 FIVE
Step -3 :-Replace each alphabet by a definite shift.
22. CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -1 :- Remove space, comma(,) , dot(.), “ “,
etc.
and write a simple sentence.
ATTACKAT5PM
23. CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
ATTACKAT5PM
Step -2 :- Replace numbers by alphabets.
ATTACKATFIVEPM
24. CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -3 :-Replace each alphabet by a definite shift.
Plain Text :A T T A C K A T F I V E P M
Cipher Text :D W W D F N D W I L Y H S P
27. Cipher Disk
Enciphering & Deciphering tool.
Developed by Italian Architect
Leon Battista Alberti in 1470.
It Consist of two concentric disk.
1) Large :- Stationary
2) Small :- Movable
29. Cipher Disk
How Cipher Disk is Useful ?
Disadvantage of Shift Cipher method is that
there are only 25 different possibilities for
each alphabet.
Cipher Disk is useful to decrypt the Cipher
code very quickly.
30. Permutation Cipher
It is one of the most advance methods used
now a days.
What is the advantage to use Permutation Cipher?
It is next to impossible to decrypt the code
encrypted by Permutation Cipher.
31. Permutation Cipher
* Method to create Permutation Cipher Code:-
Step-1 :- Write all the alphabets in a row for the
plain text.
Step-2 :- Randomly choose any of the 26 alphabets
for each alphabet of the plain text.
Ex. For A choose N, For B choose W, etc…
32. Permutation Cipher
P E Z R N H I M A W F O B G V Y L D K C J Q S U T X
Permuted Alphabet
38. Strong Authentication
OTP tokens
( One Time Password Generating tokens)
- Popular solution for securing
authentication.
- Widely used in Banks.
- Manufactured by RSA,
VASCO, Codes, etc.
46. Wireless Communication
Why use Cryptography for Wireless Communication ?
Because…
-It is very easy for any one to hack any wireless
communication than an wired communication.
-All that required are only laptop and an antenna..!
47. Wireless Communication
It is the most widely used standard for wireless
networking today.
Cryptography plays an important role in Wi-fi in two
ways…
1) Securing data transmission
2) End point authentication
48. Wireless Communication
It is designed to enable wireless data exchange over
short distance.
Cryptography plays an important role in Bluetooth in
two aspect :-
1) Confidentially
2) Authentication (called pairing)
49. Every person in this world is related to
CRYPTOGRAPHY…!
Communication Technology
Cyber Security
CRYPTOGRAPHY