Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cryptography Basics

818 views

Published on

Published in: Technology, Education
  • Be the first to comment

Cryptography Basics

  1. 1. Cryptography Basics Ali Sadhik Shaik [email_address] Edith Cowan University; Risk and Security Management .
  2. 2. Why Cryptography? <ul><li>Security </li></ul>Ali Sadhik, Edith Cowan University E-business
  3. 3. Ali Sadhik, Edith Cowan University <ul><li>Technical Aspects of security is cryptography </li></ul><ul><li>Encrypting data against disclosure, Modification </li></ul><ul><li>Signing data against modification, Repudiation </li></ul>
  4. 4. <ul><li>If the confidentiality or accuracy of your information is of any value at all, it should be protected to an appropriate level. </li></ul><ul><li>If the unauthorized disclosure or alteration of the information could result in any negative impact, it should be secured. </li></ul>Ali Sadhik, Edith Cowan University
  5. 5. Generic way Ali Sadhik, Edith Cowan University
  6. 6. Cryptography terms <ul><li>Encryption: A process by which a plaintext is converted to cyphertext using a key </li></ul><ul><li>Decryption: A process by which cyphertext is converted to plaintext. </li></ul><ul><li>Plaintext: data. </li></ul>Ali Sadhik, Edith Cowan University
  7. 7. Encryption Operations <ul><li>Common Ciphers </li></ul><ul><li>Vernam Cipher (one-time Pad) </li></ul><ul><li>Running Key Cipher </li></ul><ul><li>Symmetric Encryption </li></ul><ul><li>Data Encryption Standard (DES) </li></ul><ul><li>Triple DES </li></ul><ul><li>Advanced Encryption Standard (AES) </li></ul><ul><li>Asymmetric Encryption </li></ul>Ali Sadhik, Edith Cowan University
  8. 8. Reference: <ul><li>“ Management of Information Security” </li></ul><ul><li>Whitman, M E & Mattord, H J. </li></ul>Ali Sadhik, Edith Cowan University

×