SlideShare a Scribd company logo
1 of 19
Cryptography
Encryption & Decryption process applied with
documents and emails
Define four aspects of security in a network: privacy,
authentication, integrity, and nonrepudiation.
Understand how these aspects can be achieved using
encryption and decryption.
Understand the difference between secret-key and
public-key encryption.
OBJECTIVES
Realize how a digital signature can provide privacy,
integrity, and nonrepudiation.
Aspects of security
 Privacy :only the sender and the receiver of the message are
able to understand the contents of the messages.
 Authentication : the receiver needs to be sure of the sender’s
identity.(vice versa)
 Integrity : the contents of the message should not be changed
during transmission.
 Non-repudiation: a secure system needs to prove that the
sender actually sent the message.
Privacy/Confidentiality/Secrecy
 The privacy can be achieved using encryption / decryption
methods.
 Two categories of encryption/decryption:
Secret key(Symmetric key)
Public key(Asymmetric key)
Secret key encryption
 Ciphertext : data are encrypted
 Plaintext : the data are not encrypted
 Note that the secret key encryption algorithms are often
referred to as symmetric encryption algorithms.
Symmetric encryption
A Single key, a shared key
Encrypt with the key
Decrypt with the same key
 Secret key
 Keep it secret!
 If it gets out, you’ll need another key
Does not scale very well
Give the key to a lot of people
Watch them lose the key
Very fast to use
Not a lot of overhead
Often combined with asymmetric encryption
An example
ORIGINAL MESSAGE: GO HOME
ENCRYPTION KEY: shift by 2
ENCODE MESSEGE: IQ JQOG
Public key encryption
 The whole idea of this method is that the encryption
and decryption algorithms are not the inverse of each
other.
Combination
 The public key is used to encrypt the secret key.
 The secret key is used to encrypt the message.
An example
Digital Signature
Digital signature
 Digital signature
 When an author signs a document, it cannot be changed.
 When you send a document electronically, you can also sign it.
 Digital signature can be done in two ways:
You can sign the whole document
You can sign a digest(piece) of the document
 A digital signature is basically a way to answer that
an electronic document (email, spreadsheet, text
file etc.) is authentic.
Digital Signature Algorithm
Digital Signature can be used to identify the message source
and the integrity of the message by using specialised Digital
Signature Algorithm(DSA).
Slightest modification in then message would discard the
message and report back to its sender…
Hashing
M(P1)=H
M = Hash function
P1= Plain Text
H1= Hash Value
For Example
Input number: 191089
Hashing algorithm: Input number x 243
Hash value: 46434627
Signing the document
Step-1: The original text/document goes through the hash
algorithm to generate a hash value, say H1
Step-2: This hash value H1 is encrypted by using the
signer’s(sender’s) Private key to generate the digital
signature, say D1
Step-3: This digital signature combined with the original text
becomes the ‘Digitally signed document’ and send over the
public/ private network.
Verifying the document
Step-1: The document part is hashed to generate a value, say
H2.
Step-2: The digital signature D1 is decrypted by using the
Public key of the sender to generate another value, say H3.
Step-3: If H2 and H3 matches then the authenticity of the
document is verified otherwise the document generated may
not be exact!
Overall how it Works
Other ways of authentication
Password
Digital certificate
Thank you

More Related Content

What's hot

Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13ravik09783
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jhaManishaJha43
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Phan Minh
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Cryptography
CryptographyCryptography
Cryptographyfsl khan
 

What's hot (17)

Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Group 6
Group 6Group 6
Group 6
 
Encryption
EncryptionEncryption
Encryption
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Data Encryption
Data EncryptionData Encryption
Data Encryption
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Cryptography
CryptographyCryptography
Cryptography
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Cryptography (20)

cryptography
cryptographycryptography
cryptography
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Unit v
Unit vUnit v
Unit v
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CRYPT.pptx
CRYPT.pptxCRYPT.pptx
CRYPT.pptx
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
E business--dig sig
E business--dig sigE business--dig sig
E business--dig sig
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
 
Email security
Email securityEmail security
Email security
 
Ao318992
Ao318992Ao318992
Ao318992
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

Cryptography

  • 1. Cryptography Encryption & Decryption process applied with documents and emails
  • 2. Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation. Understand how these aspects can be achieved using encryption and decryption. Understand the difference between secret-key and public-key encryption. OBJECTIVES Realize how a digital signature can provide privacy, integrity, and nonrepudiation.
  • 3. Aspects of security  Privacy :only the sender and the receiver of the message are able to understand the contents of the messages.  Authentication : the receiver needs to be sure of the sender’s identity.(vice versa)  Integrity : the contents of the message should not be changed during transmission.  Non-repudiation: a secure system needs to prove that the sender actually sent the message.
  • 4. Privacy/Confidentiality/Secrecy  The privacy can be achieved using encryption / decryption methods.  Two categories of encryption/decryption: Secret key(Symmetric key) Public key(Asymmetric key)
  • 5. Secret key encryption  Ciphertext : data are encrypted  Plaintext : the data are not encrypted  Note that the secret key encryption algorithms are often referred to as symmetric encryption algorithms.
  • 6. Symmetric encryption A Single key, a shared key Encrypt with the key Decrypt with the same key  Secret key  Keep it secret!  If it gets out, you’ll need another key Does not scale very well Give the key to a lot of people Watch them lose the key Very fast to use Not a lot of overhead Often combined with asymmetric encryption
  • 7. An example ORIGINAL MESSAGE: GO HOME ENCRYPTION KEY: shift by 2 ENCODE MESSEGE: IQ JQOG
  • 8. Public key encryption  The whole idea of this method is that the encryption and decryption algorithms are not the inverse of each other.
  • 9. Combination  The public key is used to encrypt the secret key.  The secret key is used to encrypt the message.
  • 12. Digital signature  Digital signature  When an author signs a document, it cannot be changed.  When you send a document electronically, you can also sign it.  Digital signature can be done in two ways: You can sign the whole document You can sign a digest(piece) of the document  A digital signature is basically a way to answer that an electronic document (email, spreadsheet, text file etc.) is authentic.
  • 13. Digital Signature Algorithm Digital Signature can be used to identify the message source and the integrity of the message by using specialised Digital Signature Algorithm(DSA). Slightest modification in then message would discard the message and report back to its sender…
  • 14. Hashing M(P1)=H M = Hash function P1= Plain Text H1= Hash Value For Example Input number: 191089 Hashing algorithm: Input number x 243 Hash value: 46434627
  • 15. Signing the document Step-1: The original text/document goes through the hash algorithm to generate a hash value, say H1 Step-2: This hash value H1 is encrypted by using the signer’s(sender’s) Private key to generate the digital signature, say D1 Step-3: This digital signature combined with the original text becomes the ‘Digitally signed document’ and send over the public/ private network.
  • 16. Verifying the document Step-1: The document part is hashed to generate a value, say H2. Step-2: The digital signature D1 is decrypted by using the Public key of the sender to generate another value, say H3. Step-3: If H2 and H3 matches then the authenticity of the document is verified otherwise the document generated may not be exact!
  • 17. Overall how it Works
  • 18. Other ways of authentication Password Digital certificate