SlideShare a Scribd company logo
1 of 50
C r y p t o g r a p h y
Presented by… Saumil Patel
Divyarajsinh Vaghela
Richa Raval
Milan Patel
History and
Introduction of
Cryptography
-Richa Raval
C R Y P T O G R A P H Y
An art of making and solving codes…
What is Cryptography?
C R Y P T O G R A P H Y
What was the need to invent Cryptography?
For Secure Communication…
C R Y P T O G R A P H Y
Hacker
C R Y P T O G R A P H Y
Key Words
 Plain Text :- It is the simple text.
 Cipher Text :- It is the coded text.
 Encryption :- Converting plain text into
Cipher text.
 Decryption :- Converting back from Cipher
text into Plain text.
(Ex. Hello)
(Ex. lkjne)
C R Y P T O G R A P H Y
Defination
It is the practice and study of
techniques for secure
communication of data.
This system is called Cryptosystem.
of
Ancient History
Pioneer of Cryptography :- Julius Caesar
Birth :- 100 BC
Country :- Rome
Invention :- Shift Cipher method
Ancient History
 Started in Egypt in 3000 B.C.
 They found it very complicate due to
insufficient knowledge of Mathematics
& Cryptography.
 Finally they had to stop it…
Ancient History
 Weakness of Shift Cipher :- Any one can decrypt it easily
 Well known example of…
Mary Queen of Scot
Queen Elizabeth I
c
c
Modern History
(Zimmermann’s Telegram)
Sent by Arthur Zimmermann, the
foreign secretary of Germany on
11/01/1917.
United States entered into
World War - I
It was intercepted and decoded
by British Intelligence.
In 20th Century…
Invented by Arthur Scherbius at
the end of World War I.
Intention:- To Encode and decode
of Ciphers.
 Adopted by Military and Govt.
First broken by Polish Cipher
Bureau in Dec.1932 by using
Theoretical Mathematics and
Reverse Engineering.
Enigma Machine
In 21th Century…
After the end of World War II, the Encryption
and Decryption has shifted from ….
In 21th Century…
Parallel to the development of…
…advance methods in Cryptography were developed.
Shift Cipher
DES Cipher RSA Cipher
Permutation Cipher
DH Secret key exchange method
Ceasar Cipher/
Shift Cipher Method
-Saumil Patel
Indian Army
Pakistan Army
ATTACK AT
5 P.M.
DWWDFND
WILYHSP
DWWDFND
WILYHSP
ATTACK AT
5 P.M.
?
How did they do it…???
They use a method called…
CEASAR CIPHER
CEASAR CIPHER
 One of the simplest and widely known
encryption technique.
 Named after Julius Caesar.
 He used it in his private
communication.
 This method is also known as
Shift Cipher or Ceaser’s Code.
CEASAR CIPHER
CEASAR CIPHER
How to convert a text into Cipher Code?
Step -1 :- Remove space, comma(,) , dot(.), “ “,
etc.
and write a simple sentence.
Step -2 :- Replace numbers by alphabets.
ex. 5  FIVE
Step -3 :-Replace each alphabet by a definite shift.
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -1 :- Remove space, comma(,) , dot(.), “ “,
etc.
and write a simple sentence.
 ATTACKAT5PM
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
 ATTACKAT5PM
Step -2 :- Replace numbers by alphabets.
 ATTACKATFIVEPM
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -3 :-Replace each alphabet by a definite shift.
Plain Text :A T T A C K A T F I V E P M
Cipher Text :D W W D F N D W I L Y H S P
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Cipher Text: DWWDFNDWILYHSP
Cipher Disk &
Permutation Method
-Divyarajsinh Vaghela
Cipher Disk
 Enciphering & Deciphering tool.
 Developed by Italian Architect
Leon Battista Alberti in 1470.
 It Consist of two concentric disk.
1) Large :- Stationary
2) Small :- Movable
Cipher Disk
Plain TextCipher
Text
Cipher Disk
 How Cipher Disk is Useful ?
Disadvantage of Shift Cipher method is that
there are only 25 different possibilities for
each alphabet.
Cipher Disk is useful to decrypt the Cipher
code very quickly.
Permutation Cipher
 It is one of the most advance methods used
now a days.
What is the advantage to use Permutation Cipher?
 It is next to impossible to decrypt the code
encrypted by Permutation Cipher.
Permutation Cipher
* Method to create Permutation Cipher Code:-
Step-1 :- Write all the alphabets in a row for the
plain text.
Step-2 :- Randomly choose any of the 26 alphabets
for each alphabet of the plain text.
Ex. For A choose N, For B choose W, etc…
Permutation Cipher
P E Z R N H I M A W F O B G V Y L D K C J Q S U T X
Permuted Alphabet
Permutation Cipher
Ex. ATTACK AT 5 P.M.
 A T T A C K A T F I V E P M
P PCC Z F P CHAQ N Y B
Permutation Cipher
ATTACK AT 5 P.M. PCCPZFPCHAQNYB
PCCPZFPCHAQNYB
Applications &
Importance of
Cryptography
- Milan Patel
 Cryptography plays an important role in
many IT applications !
HOW..???
Let’s see an overview…
Strong Authentication
 Cryptography plays an important role in
Identity Management.
There are many methods from…
to
Strong Authentication
OTP tokens
( One Time Password Generating tokens)
- Popular solution for securing
authentication.
- Widely used in Banks.
- Manufactured by RSA,
VASCO, Codes, etc.
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
 To access e-banking site.
 To secure online credit card transaction.
 For secure email messaging.
 File sharing.
TLS protocol
Strong Authentication
(Transport Layer Security)
- Most widely used protocol.
- Ex. Certificate for server authentication.
Wireless Communication
Why use Cryptography for Wireless Communication ?
Because…
-It is very easy for any one to hack any wireless
communication than an wired communication.
-All that required are only laptop and an antenna..!
Wireless Communication
 It is the most widely used standard for wireless
networking today.
 Cryptography plays an important role in Wi-fi in two
ways…
1) Securing data transmission
2) End point authentication
Wireless Communication
 It is designed to enable wireless data exchange over
short distance.
 Cryptography plays an important role in Bluetooth in
two aspect :-
1) Confidentially
2) Authentication (called pairing)
Every person in this world is related to
CRYPTOGRAPHY…!
Communication Technology
Cyber Security
CRYPTOGRAPHY
Cryptography

More Related Content

Similar to Cryptography

What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...Amazon Web Services
 
My cryptography
My cryptographyMy cryptography
My cryptographyNAVYA RAO
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryptionfaffyman
 

Similar to Cryptography (20)

What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Cryptography
CryptographyCryptography
Cryptography
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Itt project
Itt projectItt project
Itt project
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
 
Cryptography
CryptographyCryptography
Cryptography
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryption
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Cryptography

Editor's Notes

  1. <number>
  2. <number>