SlideShare a Scribd company logo
1 of 24
Cryptography Made by:- Shray Jali
Cryptography ,[object Object]
Formed from the Greek words kryptós, "hidden", and logos, "word".
Cryptography is a framework of methodologies used to ensure the CIA triad for our information C –Confidentiality  I –Integrity  A -Authenticity ,[object Object]
It could be implemented manually, mechanically or even electronically ,[object Object]
If we are using symmetric encryption, then we will encrypt the clear message with one key and decrypt it with the same key,[object Object]
We need to define a way by which we can exchange these private keys in a secure manner between distant entities
DES, 3DES, Blowfish, IDEA, RC5, Safer, Serpent and AES are the well known symmetric encryption algorithms,[object Object],[object Object]
RSA is the famous asymmetric key encryption algorithm,[object Object]
Early Cryptography 500- 600 BC 486 BC: Greece 60 –50 BC: JuliusCaesar Substitution cipher Used by Hebrew Shift letters by X positions  E.g. X = 3: A -> D, B -> E,  C ->F, ..
Medieval Cryptography 1845: Morse code 1918: The ENIGMA ,[object Object]
“Scrambler”,[object Object],[object Object]
modern Cryptography 1976: Diffie-Hellman Key Exchange Private key: This key must be know only by its owner. Public key: This key is known to everyone
modern Cryptography 1977: RSA: Rivest, Shamir & Adleman Algorithm ,[object Object]
Variable Key Size (512, 1024, or 2048 bits)
Most popular public key algorithm,[object Object]
Uses a block cipher called IDEA
Uses Digital Signatures
Uses Web Trust
E.g. X.509 certificates in SSL ,[object Object]
Encryption works by means of key and Decryption is the reverse of encryption process using the same keyThe Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs which are used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access Stream Ciphers ,[object Object]
Suitable for online encryption of data, e.g. Encrypting Voice Comms
Much faster than block ciphers for online work,[object Object]
Encryption operates on plaintext using the encryption key and the modulus to produce cipher text

More Related Content

What's hot

Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
cryptography
cryptographycryptography
cryptography
 

Viewers also liked

Reading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & GauguinReading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & Gauguin
AzmiSuhaimi
 
Planos Proyecto Tiovivo PresentacióN2 (1 )
Planos Proyecto Tiovivo PresentacióN2  (1 )Planos Proyecto Tiovivo PresentacióN2  (1 )
Planos Proyecto Tiovivo PresentacióN2 (1 )
margarita mayoral
 
Tanja and Asgeir
Tanja and AsgeirTanja and Asgeir
Tanja and Asgeir
Signe Sloth
 
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn BoogaardFlex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Esri Nederland
 
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektistEesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Ene-Silvia Sarv
 

Viewers also liked (20)

Reading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & GauguinReading Visual Images: Post-Impressionism & Gauguin
Reading Visual Images: Post-Impressionism & Gauguin
 
Apply Design Thinking LA
Apply Design Thinking LAApply Design Thinking LA
Apply Design Thinking LA
 
Manuale sicurnet visite mediche
Manuale sicurnet visite medicheManuale sicurnet visite mediche
Manuale sicurnet visite mediche
 
Planos Proyecto Tiovivo PresentacióN2 (1 )
Planos Proyecto Tiovivo PresentacióN2  (1 )Planos Proyecto Tiovivo PresentacióN2  (1 )
Planos Proyecto Tiovivo PresentacióN2 (1 )
 
Presentacinccparaudelarcorregidaal proeva2013
Presentacinccparaudelarcorregidaal proeva2013Presentacinccparaudelarcorregidaal proeva2013
Presentacinccparaudelarcorregidaal proeva2013
 
Greetings
GreetingsGreetings
Greetings
 
eFront Commercial Editions Overview
eFront Commercial Editions OvervieweFront Commercial Editions Overview
eFront Commercial Editions Overview
 
Tanja and Asgeir
Tanja and AsgeirTanja and Asgeir
Tanja and Asgeir
 
Cd howe can-us_housing_market_commentary
Cd howe can-us_housing_market_commentaryCd howe can-us_housing_market_commentary
Cd howe can-us_housing_market_commentary
 
Floorplans
FloorplansFloorplans
Floorplans
 
Wikipedia
WikipediaWikipedia
Wikipedia
 
Calificador
CalificadorCalificador
Calificador
 
E learning
E learningE learning
E learning
 
Google drive -_manual_avanzado (1)
Google drive -_manual_avanzado (1)Google drive -_manual_avanzado (1)
Google drive -_manual_avanzado (1)
 
лекция 19
лекция 19лекция 19
лекция 19
 
Kinder
KinderKinder
Kinder
 
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn BoogaardFlex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
Flex en silverlight viewer configuratie, Esri, Mark Jagt, Boudewijn Boogaard
 
Alex Wheatley Visual Resume
Alex Wheatley Visual ResumeAlex Wheatley Visual Resume
Alex Wheatley Visual Resume
 
3 - Come usare Storyline con Docebo: creare un Quiz
3 - Come usare Storyline con Docebo: creare un Quiz3 - Come usare Storyline con Docebo: creare un Quiz
3 - Come usare Storyline con Docebo: creare un Quiz
 
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektistEesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
Eesti õppekava filosoofilis-teoreetilistest ja rakenduslikust aspektist
 

Similar to Cryptography

Cryptography
CryptographyCryptography
Cryptography
Rohan04
 

Similar to Cryptography (20)

Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Crypt
CryptCrypt
Crypt
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Final ss2-digital-signature-group5
Final ss2-digital-signature-group5Final ss2-digital-signature-group5
Final ss2-digital-signature-group5
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Is case study
Is   case studyIs   case study
Is case study
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 

More from Shray Jali (19)

Larsen & toubro
Larsen & toubroLarsen & toubro
Larsen & toubro
 
Havells india ltd
Havells india ltdHavells india ltd
Havells india ltd
 
Marutisuzuki ERP
Marutisuzuki ERPMarutisuzuki ERP
Marutisuzuki ERP
 
Dell CRM
Dell CRMDell CRM
Dell CRM
 
Havells India Ltd
Havells India LtdHavells India Ltd
Havells India Ltd
 
CRM practices in Dell Inc.
CRM practices in Dell Inc.CRM practices in Dell Inc.
CRM practices in Dell Inc.
 
Implications Of Wto On India
Implications Of Wto On IndiaImplications Of Wto On India
Implications Of Wto On India
 
AOL Goes Far East
AOL Goes Far EastAOL Goes Far East
AOL Goes Far East
 
Maruti Suzuki Oracle Erp
Maruti Suzuki Oracle ErpMaruti Suzuki Oracle Erp
Maruti Suzuki Oracle Erp
 
Indian Textile Industry and its relations with EU
Indian Textile Industry and its relations with EUIndian Textile Industry and its relations with EU
Indian Textile Industry and its relations with EU
 
Apollo Hospitals
Apollo HospitalsApollo Hospitals
Apollo Hospitals
 
Wpi
WpiWpi
Wpi
 
Clinical Data Management
Clinical Data ManagementClinical Data Management
Clinical Data Management
 
Culture Of France
Culture Of FranceCulture Of France
Culture Of France
 
Edouard Manet
Edouard ManetEdouard Manet
Edouard Manet
 
Motivation Std Chartered
Motivation Std CharteredMotivation Std Chartered
Motivation Std Chartered
 
Sir Richard Branson
Sir Richard BransonSir Richard Branson
Sir Richard Branson
 
Global Software Solutions
Global Software SolutionsGlobal Software Solutions
Global Software Solutions
 
Attrition
AttritionAttrition
Attrition
 

Cryptography