SlideShare a Scribd company logo
1 of 28
CRYPTOGRAPHY IN
INFORMTAION SECURITY
PRESENTED AND PERFORMED BY
SABIHA BATOOL (TC-17)
NED UNIVERSITY OF KARACHI
TELECOMMUNICATION ENGINEERING
SYNOPSIS
CRYPTOGRAPHY
 Terms
 Types
 RSA algorithm
INFORMATION SECURITY
 Objectives of security
 Data integrity
 Authentication
 Confidentiality
 Non repudiation
 LETRATURE REVIEW
 CONCLUSION
 REFERENCES
HISTORY
 The conceptual foundation of cryptography was laid out around
3000 years ago in India and china. Since the early days of writing,
heads of state and military commanders understood that it was
necessary to provide some mechanism to protect the
confidentiality of written correspondence and to have some means
of detecting tampering. . World war ii brought about much
advancement in information security and marked the beginning of
the professional field of information security
CRYPTOGRAPHY
• The word cryptography is derived from Greek words “KRYPTOS” means hidden /
secret and “GRAPHEIN” means “to study or write”
 DEFINITION :
 Cryptography is the practice and study of techniques for securing communication and
data/ information in the presence of adversaries.
 It is the study of using mathematics to encrypt and decrypt data.
 To establish a shared secret when other people (eavesdroppers) are listening.
BASIC TERMS IN CRYPTOGRAPHY
ENCRYPTION OR DECRYPTION: Scrambling a message or data using cryptographic
techniques.
PLAINTEXT : the message or data.
CIPHER TEXT : the scrambled (encrypted) version of message .
KEY : Information used in cipher known only to sender/ receiver.
TYPES OF CRYPTOGRAPHY
SYMETRIC KEY CRYPTOGRAPHY
ASYMETRIC KEY CRYPTOGRAPHY
HASH FUNCTION
 The main purpose of this function is to make sure that the original
information is not tampered with.
 Hash function is one way encryption.
 It provides digital fingerprints
 It also helps for password encryption.
RSA ALGORITHM
PUBLISHED IN 1978 BY MIT ,US.
The main function of this algorithm is to providing approach to
public key cryptography and encryption.
In this the cipher text are all the integers between 0 to n-1
INFORMATION SECURITY
WHY IT IS NEEDED?
WHERE?
HOW?
INFORMATION SECURITY
In this information era :
• Information is encoded into bit stream and transmitted on wireless
networks / internet.
• During transmission information it is vulnerable to attack.
• SOLUTION : CRYPTOGRAPHY IN INFORMATION SECURITY.
OBJECTIVES OF SECURITY
To avoid data threats.
To avoid denial of services.
To secure information / data from Masquerades.
To safeguard information from traffic analyzer.
To not to make the message for third person.
DATA INTEGRITY
C could alter the message or the message could change
while in transit . If B does not detect this , then we have
LOSS OF INTEGRITY.
SOLUTION : ENCRYPTION
A B
C
M
AUTHENTICATION
C could send a message to B pretending to be A, if B can not be verify the source
of the information then we have LACK AUTHENTICATION.
SOLUTION : PASSWORDS AND DIGITAL SIGNATURES
A B
C
M
CONFIDENTIALITY
C could view the secret message by eavesdropping on the communication.
SOLUTION : ENCRYPTION
A B
C
M
NON REPUDIATION
A might repudiate having sent M to B.
SOLUTION : DIGITAL SIGNATURES
A B
M
DIGITAL SIGNATURE
 A protocol that produces the same effect as a real signature.
 A mark that only the sender can make.
 A digital signature is a mathematical scheme for demonstrating
the authenticity of a digital message or document.
PASSWORD AUDITING
 Should not be in upper case.
 At least 8 characters.
 Must include alphabets , numeric keys and special characters.
 It should not be the dictionary word or user name.
 Must be updated at least once a month.
LITERATURE REVIEW
S# AURHOR NAME AND YEAR STATEMENTS OF AUTHORS
1 2019 , Laura Savu Cryptography is used in information security to
protect information from unauthorized or accidental
disclosure.[3].
2 2019 , June ,nurhayat varol ,
abdalbasit .
Has an important role role which requires privacy to
be protected when data is sent .[4].
3 2015 , August , Sanket A. Ubhad,
prof. Nilesh Chaubey , prof. Shyam
P.
Text should be send in additionally converted into
computer codes.[5].
4 2016 , April , Marukh- Juhaani
O.Saarinen , Elizzbeth O’Sullivan
Implementations must be able to create public and
private keys for lattice based digital signatures.[6].
5 2016 , August , Neal Koblitz
,Palash Sarkar.
A tight information security reduction is often very
useful in establishing confidence in protocole.[7].
6 2015 , Saritaa kumara. To secure data , compression should use for security
ADVANTAGES
 Cryptography is an essential information security tool.
 Encryption can protect communications from unauthorized
parties.
 Cryptographic technique can protect against spoofing and
message forgeries.
DRAWBACKS
 Provides a means for tax evasion, money laundering ‘ contract
killings, and implementation of data havens for storing and
marketing illegal or controversial material.
 Electronic information can be bought and sold on "black
networks“. With complete secrecy.
APPLICATIONS
 Credit card information.
 Private correspondence.
 Social security numbers.
 Personal details.
 Sensitive company information.
CONCLUSION(1)
From a technical point of view, cryptography is the solution to many
of the security challenges that are present in the internet. The
technology exists to solve most of the problems. However, there are
several issues that have obstructed the widespread use of
cryptography in the internet. First of all, cryptography, as a science,
faces a difficult problem for example, terrorists could communicate
information over the internet using encryption that law enforcement
agencies could not decrypt.
CONCLUSION(2)
Thus information security measures are needed to protect data from
hackers, when it is transmitted between terminal user and computer
and between computer and computer and it is also necessary to
protect the computer system when there is an attack of virus. The
capability of security enabled components still lags behind the
claims. Everyone has a different idea of what “security” is, and what
levels of risk are acceptable. It’s important to build systems and
networks in such a way that the user is not constantly reminded of
the security system around him.
REFERENCE(1)
[1]. 1. TIM MAY, "CRYPTO ANARCHY AND VIRTUAL COMMUNITIES," INTERNET
SECURITY, APRIL 2015, PP. 4-12.
[2] .KARLS, M. A, CODES, CIPHERS, AND CRYPTOGRAPHY-AN HONORS
COLLOQUIUM, 2011.
[3]. LAURA SAVU , CRYPTO AND INFORMATION SECURITY , 2019. BACHMAN, D. J.;
BROWN, E. A.;
[4]. NORTON, A.H, CHOCOLATE KEY CRYPTOGRAPHY, MATHEMATICS TEACHER,
104(2),2010.
[5]. PRIMUS, 20 (1),2010, P21-38.
REFERENCE(2)
[6]. DIFFIE, W. HELLMAN, M., NEW DIRECTIONS IN CRYPTOGRAPHY, IEEE TRANSACTIONS ON
INFORMATION THEORY, NOV 1976, VOLUME: 22, ISSUE: 6, 644- 654.
[7]. BUTLER W. LAMPSON, COMPUTER SECURITY IN THE REAL WORLD, COMPUTER, VOL. 37,
NO. 6, PP. 37-46, JUN., 2004.
[8]. ANDERSON, J., COMPUTER SECURITY TECHNOLOGY PLANNING STUDY, U.S. AIR FORCE
ELECT. SYS. DIV. TECH. RPT. 73-51, OCT 1972;
[9]. JOANNA LYN GRAMA, “LEGAL ISSUES IN INFORMATION SECURITY”, PUBLISHER: JONES &
BARTLETT LEARNING .
[10]. GENÇOĞLU, M.T, EMBEDDED IMAGE CODING USING LAPLACE TRANSFORM FOR TURKISH
LETTERS, MULTIMEDIA TOOLS AND APPLICATIONS, 67(3),2019,PP 1-14
THANK YOU


More Related Content

What's hot

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption WorksMasato Nozawa
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Data security & cryptography
Data security & cryptography Data security & cryptography
Data security & cryptography Muhammad Danish
 
Cryptography
CryptographyCryptography
CryptographyHira Khan
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllJarno Limnéll
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckJarno Limnéll
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Frsa
FrsaFrsa
Frsa_111
 

What's hot (17)

Steganography
Steganography Steganography
Steganography
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Ccn
CcnCcn
Ccn
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Data security & cryptography
Data security & cryptography Data security & cryptography
Data security & cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Crim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéllCrim cybersecurity_jarno_limnéll
Crim cybersecurity_jarno_limnéll
 
Communication security
Communication securityCommunication security
Communication security
 
Cyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality CheckCyber Conflicts - Time for Reality Check
Cyber Conflicts - Time for Reality Check
 
Secure communication
Secure communicationSecure communication
Secure communication
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Encryption
EncryptionEncryption
Encryption
 
Frsa
FrsaFrsa
Frsa
 

Similar to Cryptography in formtaion security

Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptxRiddhiGupta84
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security andIaetsd Iaetsd
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent Mwando
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 

Similar to Cryptography in formtaion security (20)

Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 

Recently uploaded

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Recently uploaded (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Cryptography in formtaion security

  • 1. CRYPTOGRAPHY IN INFORMTAION SECURITY PRESENTED AND PERFORMED BY SABIHA BATOOL (TC-17) NED UNIVERSITY OF KARACHI TELECOMMUNICATION ENGINEERING
  • 2. SYNOPSIS CRYPTOGRAPHY  Terms  Types  RSA algorithm INFORMATION SECURITY  Objectives of security  Data integrity  Authentication  Confidentiality  Non repudiation  LETRATURE REVIEW  CONCLUSION  REFERENCES
  • 3. HISTORY  The conceptual foundation of cryptography was laid out around 3000 years ago in India and china. Since the early days of writing, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. . World war ii brought about much advancement in information security and marked the beginning of the professional field of information security
  • 4. CRYPTOGRAPHY • The word cryptography is derived from Greek words “KRYPTOS” means hidden / secret and “GRAPHEIN” means “to study or write”  DEFINITION :  Cryptography is the practice and study of techniques for securing communication and data/ information in the presence of adversaries.  It is the study of using mathematics to encrypt and decrypt data.  To establish a shared secret when other people (eavesdroppers) are listening.
  • 5. BASIC TERMS IN CRYPTOGRAPHY ENCRYPTION OR DECRYPTION: Scrambling a message or data using cryptographic techniques. PLAINTEXT : the message or data. CIPHER TEXT : the scrambled (encrypted) version of message . KEY : Information used in cipher known only to sender/ receiver.
  • 9. HASH FUNCTION  The main purpose of this function is to make sure that the original information is not tampered with.  Hash function is one way encryption.  It provides digital fingerprints  It also helps for password encryption.
  • 10. RSA ALGORITHM PUBLISHED IN 1978 BY MIT ,US. The main function of this algorithm is to providing approach to public key cryptography and encryption. In this the cipher text are all the integers between 0 to n-1
  • 11. INFORMATION SECURITY WHY IT IS NEEDED? WHERE? HOW?
  • 12. INFORMATION SECURITY In this information era : • Information is encoded into bit stream and transmitted on wireless networks / internet. • During transmission information it is vulnerable to attack. • SOLUTION : CRYPTOGRAPHY IN INFORMATION SECURITY.
  • 13. OBJECTIVES OF SECURITY To avoid data threats. To avoid denial of services. To secure information / data from Masquerades. To safeguard information from traffic analyzer. To not to make the message for third person.
  • 14. DATA INTEGRITY C could alter the message or the message could change while in transit . If B does not detect this , then we have LOSS OF INTEGRITY. SOLUTION : ENCRYPTION A B C M
  • 15. AUTHENTICATION C could send a message to B pretending to be A, if B can not be verify the source of the information then we have LACK AUTHENTICATION. SOLUTION : PASSWORDS AND DIGITAL SIGNATURES A B C M
  • 16. CONFIDENTIALITY C could view the secret message by eavesdropping on the communication. SOLUTION : ENCRYPTION A B C M
  • 17. NON REPUDIATION A might repudiate having sent M to B. SOLUTION : DIGITAL SIGNATURES A B M
  • 18. DIGITAL SIGNATURE  A protocol that produces the same effect as a real signature.  A mark that only the sender can make.  A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document.
  • 19. PASSWORD AUDITING  Should not be in upper case.  At least 8 characters.  Must include alphabets , numeric keys and special characters.  It should not be the dictionary word or user name.  Must be updated at least once a month.
  • 20. LITERATURE REVIEW S# AURHOR NAME AND YEAR STATEMENTS OF AUTHORS 1 2019 , Laura Savu Cryptography is used in information security to protect information from unauthorized or accidental disclosure.[3]. 2 2019 , June ,nurhayat varol , abdalbasit . Has an important role role which requires privacy to be protected when data is sent .[4]. 3 2015 , August , Sanket A. Ubhad, prof. Nilesh Chaubey , prof. Shyam P. Text should be send in additionally converted into computer codes.[5]. 4 2016 , April , Marukh- Juhaani O.Saarinen , Elizzbeth O’Sullivan Implementations must be able to create public and private keys for lattice based digital signatures.[6]. 5 2016 , August , Neal Koblitz ,Palash Sarkar. A tight information security reduction is often very useful in establishing confidence in protocole.[7]. 6 2015 , Saritaa kumara. To secure data , compression should use for security
  • 21. ADVANTAGES  Cryptography is an essential information security tool.  Encryption can protect communications from unauthorized parties.  Cryptographic technique can protect against spoofing and message forgeries.
  • 22. DRAWBACKS  Provides a means for tax evasion, money laundering ‘ contract killings, and implementation of data havens for storing and marketing illegal or controversial material.  Electronic information can be bought and sold on "black networks“. With complete secrecy.
  • 23. APPLICATIONS  Credit card information.  Private correspondence.  Social security numbers.  Personal details.  Sensitive company information.
  • 24. CONCLUSION(1) From a technical point of view, cryptography is the solution to many of the security challenges that are present in the internet. The technology exists to solve most of the problems. However, there are several issues that have obstructed the widespread use of cryptography in the internet. First of all, cryptography, as a science, faces a difficult problem for example, terrorists could communicate information over the internet using encryption that law enforcement agencies could not decrypt.
  • 25. CONCLUSION(2) Thus information security measures are needed to protect data from hackers, when it is transmitted between terminal user and computer and between computer and computer and it is also necessary to protect the computer system when there is an attack of virus. The capability of security enabled components still lags behind the claims. Everyone has a different idea of what “security” is, and what levels of risk are acceptable. It’s important to build systems and networks in such a way that the user is not constantly reminded of the security system around him.
  • 26. REFERENCE(1) [1]. 1. TIM MAY, "CRYPTO ANARCHY AND VIRTUAL COMMUNITIES," INTERNET SECURITY, APRIL 2015, PP. 4-12. [2] .KARLS, M. A, CODES, CIPHERS, AND CRYPTOGRAPHY-AN HONORS COLLOQUIUM, 2011. [3]. LAURA SAVU , CRYPTO AND INFORMATION SECURITY , 2019. BACHMAN, D. J.; BROWN, E. A.; [4]. NORTON, A.H, CHOCOLATE KEY CRYPTOGRAPHY, MATHEMATICS TEACHER, 104(2),2010. [5]. PRIMUS, 20 (1),2010, P21-38.
  • 27. REFERENCE(2) [6]. DIFFIE, W. HELLMAN, M., NEW DIRECTIONS IN CRYPTOGRAPHY, IEEE TRANSACTIONS ON INFORMATION THEORY, NOV 1976, VOLUME: 22, ISSUE: 6, 644- 654. [7]. BUTLER W. LAMPSON, COMPUTER SECURITY IN THE REAL WORLD, COMPUTER, VOL. 37, NO. 6, PP. 37-46, JUN., 2004. [8]. ANDERSON, J., COMPUTER SECURITY TECHNOLOGY PLANNING STUDY, U.S. AIR FORCE ELECT. SYS. DIV. TECH. RPT. 73-51, OCT 1972; [9]. JOANNA LYN GRAMA, “LEGAL ISSUES IN INFORMATION SECURITY”, PUBLISHER: JONES & BARTLETT LEARNING . [10]. GENÇOĞLU, M.T, EMBEDDED IMAGE CODING USING LAPLACE TRANSFORM FOR TURKISH LETTERS, MULTIMEDIA TOOLS AND APPLICATIONS, 67(3),2019,PP 1-14