SlideShare a Scribd company logo
1 of 3
CRYPTOGRAPHY
• A word with Greek origins, means “secret writing”.
• art of transforming messages to secure and immune to attacks.
Cryptography Issues:
Confidentiality:
End-Point Authentication:
Message Integrity & Message
Nonrepudiation:
Entity Authentication:
Definition:
Keywords:
oPlaintext: original message and Ciphertext:
encrypted
oCipher: Encryption and Decryption algorithms
Cryptography Categories:
• We can divide all the cryptography algorithms (ciphers) into two
groups:
• Symmetric key (also called secret-key) cryptography
algorithms and
• Asymmetric key (also called public-key)
cryptography algorithms.
CRYPTOGRAPHY
Famous Algorithms/Ciphers And Applications:
• Modem symmetric-key ciphers: DES and AES
• RSA Algorithm: Rivest, Shamir, and Adleman of MIT
• Quantum Cryptography:
Keeping your Secrets secret!
● Used in the military and the government
● Now used in everyday life:
–Online banking, E-commerce
–Student records, health records, tax records etc.
–ATM machines
–Social networking (emails, texts, instant messengers), Businesses
CRYPTOGRAPHY
Uses of Cryptography:

More Related Content

What's hot

Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Sina Manavi
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.pptreshmy12
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion securitysabihabatool1
 
Types of hackers
Types of hackersTypes of hackers
Types of hackersbegmohsin
 
Cloud computing and security 02
Cloud computing and security 02Cloud computing and security 02
Cloud computing and security 02Akash Kamble
 
Etical hacking
Etical hackingEtical hacking
Etical hackingtalhaabid
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security insAstha Parihar
 
Information security introduction
Information security introductionInformation security introduction
Information security introductionG Prachi
 

What's hot (17)

Cryptogaphy
CryptogaphyCryptogaphy
Cryptogaphy
 
Cryptography
CryptographyCryptography
Cryptography
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion security
 
Types of hackers
Types of hackersTypes of hackers
Types of hackers
 
Cloud computing and security 02
Cloud computing and security 02Cloud computing and security 02
Cloud computing and security 02
 
Whatisdigitalsignature
WhatisdigitalsignatureWhatisdigitalsignature
Whatisdigitalsignature
 
Encryption
EncryptionEncryption
Encryption
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Information and network security ins
Information and network security insInformation and network security ins
Information and network security ins
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 

Viewers also liked

E-commerçants: comment bien de se préparer pour Black Friday?
E-commerçants: comment bien de se préparer pour Black Friday?E-commerçants: comment bien de se préparer pour Black Friday?
E-commerçants: comment bien de se préparer pour Black Friday?Clara FELIX
 
Catalogo De Livros
Catalogo De LivrosCatalogo De Livros
Catalogo De LivrosSALE4LESS
 
Pillars of Excellence - Dec 14, 2012
Pillars of Excellence - Dec 14, 2012Pillars of Excellence - Dec 14, 2012
Pillars of Excellence - Dec 14, 2012Alicia Spaulding
 
áLbum De FotografíAs
áLbum De FotografíAsáLbum De FotografíAs
áLbum De FotografíAsPaulina
 
38219 comunicacion y expresion escrita
38219 comunicacion y expresion escrita38219 comunicacion y expresion escrita
38219 comunicacion y expresion escritaangelmanuel22
 
Institucional Innovation Office
Institucional Innovation OfficeInstitucional Innovation Office
Institucional Innovation OfficeInnovation Office
 
Festejos de São Benedito 2013
Festejos de São Benedito 2013Festejos de São Benedito 2013
Festejos de São Benedito 2013Adriano de Paula
 
Aprendizaje Colavorativo
Aprendizaje ColavorativoAprendizaje Colavorativo
Aprendizaje ColavorativoCamila Alvear
 
Formato proyecto 47037
Formato proyecto 47037Formato proyecto 47037
Formato proyecto 47037angelmanuel22
 
Formato proyecto 38673
Formato proyecto 38673Formato proyecto 38673
Formato proyecto 38673angelmanuel22
 
38935 utilización basica de las tic para elbuen desempeño escolar de los ni...
38935   utilización basica de las tic para elbuen desempeño escolar de los ni...38935   utilización basica de las tic para elbuen desempeño escolar de los ni...
38935 utilización basica de las tic para elbuen desempeño escolar de los ni...angelmanuel22
 
SuperStar_StayingLate
SuperStar_StayingLateSuperStar_StayingLate
SuperStar_StayingLateK Lewandowska
 
Formato proyecto 54578
Formato proyecto 54578Formato proyecto 54578
Formato proyecto 54578angelmanuel22
 

Viewers also liked (20)

ApresentaçãO Modelo De GestãO 24 06 2009
ApresentaçãO Modelo De GestãO   24 06 2009ApresentaçãO Modelo De GestãO   24 06 2009
ApresentaçãO Modelo De GestãO 24 06 2009
 
Merged document 88
Merged document 88Merged document 88
Merged document 88
 
The Extreme Algebra Workout
The Extreme Algebra WorkoutThe Extreme Algebra Workout
The Extreme Algebra Workout
 
E-commerçants: comment bien de se préparer pour Black Friday?
E-commerçants: comment bien de se préparer pour Black Friday?E-commerçants: comment bien de se préparer pour Black Friday?
E-commerçants: comment bien de se préparer pour Black Friday?
 
Lista de Obras - Stuqui Drywall
Lista de Obras - Stuqui DrywallLista de Obras - Stuqui Drywall
Lista de Obras - Stuqui Drywall
 
Catalogo De Livros
Catalogo De LivrosCatalogo De Livros
Catalogo De Livros
 
Pillars of Excellence - Dec 14, 2012
Pillars of Excellence - Dec 14, 2012Pillars of Excellence - Dec 14, 2012
Pillars of Excellence - Dec 14, 2012
 
áLbum De FotografíAs
áLbum De FotografíAsáLbum De FotografíAs
áLbum De FotografíAs
 
Br
BrBr
Br
 
38219 comunicacion y expresion escrita
38219 comunicacion y expresion escrita38219 comunicacion y expresion escrita
38219 comunicacion y expresion escrita
 
Institucional Innovation Office
Institucional Innovation OfficeInstitucional Innovation Office
Institucional Innovation Office
 
Festejos de São Benedito 2013
Festejos de São Benedito 2013Festejos de São Benedito 2013
Festejos de São Benedito 2013
 
Aprendizaje Colavorativo
Aprendizaje ColavorativoAprendizaje Colavorativo
Aprendizaje Colavorativo
 
Capa_peregrinofinal
Capa_peregrinofinalCapa_peregrinofinal
Capa_peregrinofinal
 
Presentation2
Presentation2Presentation2
Presentation2
 
Formato proyecto 47037
Formato proyecto 47037Formato proyecto 47037
Formato proyecto 47037
 
Formato proyecto 38673
Formato proyecto 38673Formato proyecto 38673
Formato proyecto 38673
 
38935 utilización basica de las tic para elbuen desempeño escolar de los ni...
38935   utilización basica de las tic para elbuen desempeño escolar de los ni...38935   utilización basica de las tic para elbuen desempeño escolar de los ni...
38935 utilización basica de las tic para elbuen desempeño escolar de los ni...
 
SuperStar_StayingLate
SuperStar_StayingLateSuperStar_StayingLate
SuperStar_StayingLate
 
Formato proyecto 54578
Formato proyecto 54578Formato proyecto 54578
Formato proyecto 54578
 

Similar to 3min tech talk on cryptography

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of CryptographyManjarul Hoque
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
My cryptography
My cryptographyMy cryptography
My cryptographyNAVYA RAO
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptographymarkjhouse
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 

Similar to 3min tech talk on cryptography (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Security
SecuritySecurity
Security
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Encryption
EncryptionEncryption
Encryption
 
Making Sense Of Cryptography
Making Sense Of CryptographyMaking Sense Of Cryptography
Making Sense Of Cryptography
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Criptography
CriptographyCriptography
Criptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

3min tech talk on cryptography

  • 1. CRYPTOGRAPHY • A word with Greek origins, means “secret writing”. • art of transforming messages to secure and immune to attacks. Cryptography Issues: Confidentiality: End-Point Authentication: Message Integrity & Message Nonrepudiation: Entity Authentication: Definition: Keywords: oPlaintext: original message and Ciphertext: encrypted oCipher: Encryption and Decryption algorithms
  • 2. Cryptography Categories: • We can divide all the cryptography algorithms (ciphers) into two groups: • Symmetric key (also called secret-key) cryptography algorithms and • Asymmetric key (also called public-key) cryptography algorithms. CRYPTOGRAPHY
  • 3. Famous Algorithms/Ciphers And Applications: • Modem symmetric-key ciphers: DES and AES • RSA Algorithm: Rivest, Shamir, and Adleman of MIT • Quantum Cryptography: Keeping your Secrets secret! ● Used in the military and the government ● Now used in everyday life: –Online banking, E-commerce –Student records, health records, tax records etc. –ATM machines –Social networking (emails, texts, instant messengers), Businesses CRYPTOGRAPHY Uses of Cryptography: