o INTRODUCTION
o HISTORY
o CONCEPT OF CRYPTOGRAPHY
o TYPES OF CRYPTOGRAPHY
• SYMMETRIC CRYPTOGRAPHY
• ASYMMETRIC CRYPTOGRAPHY
o DIFFERENCE B/W SYMMETRIC
AND ASYMMETRIC
o CHARACTERISTICS
o USES
o CONCLUSION
”
 CRYPTOLOGY WAS A PUBLIC FIELD IN THE UNITED STATES
UNTIL WORLD WAR 1
WHEN THE ARMY AND NAVY REALIZED ITS VALUE TO NATIONAL
SECURITY AND
BEGAN WORKING IN SECRET THROUGH THE EARLY 1970’s.
COMPUTERS MORE READILY AVAILABLE AND WHEN DEMAND FOR
ENCRYPTION INCREASED DUE TO FUNDAMENTAL CHANGES IN THE
WAYS AMERICA COMMUNICATED.
THE INCREASE IN DEMAND FOR CRYPTOGRAPHY WAS DRIVEN
BY INDUSTRY INTERESTS LIKE: FINANCIAL SERVICES REQUIRED
SECURE ELECTRONIC TRANSACTIONS NEEDED FOR SECURE
TRADE SECRETSSTORED IN COMPUTERS.
INDIVIDUAL INTERESTS LIKE : SECURE WIRELESS
COMMUNICATION.
 50 B.C.- JULIUS CAESAR USES
CRYPTOGRAPHY TECHNIQUE
A THREE WHEEL ENIGMA
MACHINE
CRYPTOGRAPHY METHOD IS
PUBLIC KEY ENCRYPTION
WHICH USES TWO
SET OF KEYS ONE KEY IS
PUBLIC WHILE OTHER KEY IS
PRIVATE WHICH IS
DISTRIBUTED ONLY TO THE
INTENDED RECIPIENT OF THE
INFORMATION.
IN THIS CRYPTOGRAPHY ONLY ONE KEY IS
USED
ONE KEY:SAME KEY FOR ENCRYPTION AND
DECRYPTION
WHEN COMPARED TO SYMMETRIC ,ASYMMETRIC
PROCESS IS SLOW i.e
BECAUSE ITS USES TWO KEYS
 PUBLIC KEY:USED FOR ENCRYPTION
 PRIVATE KEY : USED FOR DECRYPTION
SYMMETRIC ASYMMETRIC
 ÓNLY ONE KEY IS USED FOR
ENCRYPTION AND
DECRYPTION
 TWO KEYS ARE USED FOR
ENCRYPTION AND DECRYPTION
 ALGORITHM IS LESS COMPLEX
AND FASTER  ALGORITHM IS MORE COMPLEX
AND SLOWER
 TEXT IS USUAL OR LESS THAN
THE REAL TEXT SIZE
 THE SIZE OF TEXT IS MORE THAN
THE ORIGINAL TEXT SIZE
 MAINLY FOR ENCRYPTION AND
DECRYPTION.CANNOT BE USED
FOR DIGITAL SIGNATURES
 CAN BE USED FOR ENCRYPTION
AND DECRYPTION AS WELL AS
FOR DIGITAL SIGNATURES
 SECRECY IN TRANSMISSION
SECRECY IN STORAGE
 AUTHENTICATION
 INTEGRITY
 NONREPUDIATION
 ELECTRONIC SIGNATURE.
 ELECTRONIC CASH.
 TIME STAMPING.
 DISK ENCRYPTION.
 SECURE NETWORK COMMUNICATION
 CASH WITHDRAWAL FROM ATM
 PAY TV
 EMAIL
 FILE STORAGE
 SECURE WEB BROWSING
 GSM MOBILE PHONE
 WHATSAPP
 AS WILL HAVE BECOME
CLEAR,CRYPTOGRAPHY IS LITERALLY
EVERYWHERE, IT PLAYS A QUIET BUT
IMPORTANT ROLE IN MANY DAY-TO-
DAY ACTIVITIES.
 THIS TECHNOLOGY IS A BOON FOR
THE NEXT GENERATION.
Cryptography

Cryptography

  • 2.
    o INTRODUCTION o HISTORY oCONCEPT OF CRYPTOGRAPHY o TYPES OF CRYPTOGRAPHY • SYMMETRIC CRYPTOGRAPHY • ASYMMETRIC CRYPTOGRAPHY o DIFFERENCE B/W SYMMETRIC AND ASYMMETRIC o CHARACTERISTICS o USES o CONCLUSION
  • 3.
  • 4.
     CRYPTOLOGY WASA PUBLIC FIELD IN THE UNITED STATES UNTIL WORLD WAR 1 WHEN THE ARMY AND NAVY REALIZED ITS VALUE TO NATIONAL SECURITY AND BEGAN WORKING IN SECRET THROUGH THE EARLY 1970’s. COMPUTERS MORE READILY AVAILABLE AND WHEN DEMAND FOR ENCRYPTION INCREASED DUE TO FUNDAMENTAL CHANGES IN THE WAYS AMERICA COMMUNICATED. THE INCREASE IN DEMAND FOR CRYPTOGRAPHY WAS DRIVEN BY INDUSTRY INTERESTS LIKE: FINANCIAL SERVICES REQUIRED SECURE ELECTRONIC TRANSACTIONS NEEDED FOR SECURE TRADE SECRETSSTORED IN COMPUTERS. INDIVIDUAL INTERESTS LIKE : SECURE WIRELESS COMMUNICATION.
  • 5.
     50 B.C.-JULIUS CAESAR USES CRYPTOGRAPHY TECHNIQUE A THREE WHEEL ENIGMA MACHINE
  • 8.
    CRYPTOGRAPHY METHOD IS PUBLICKEY ENCRYPTION WHICH USES TWO SET OF KEYS ONE KEY IS PUBLIC WHILE OTHER KEY IS PRIVATE WHICH IS DISTRIBUTED ONLY TO THE INTENDED RECIPIENT OF THE INFORMATION.
  • 11.
    IN THIS CRYPTOGRAPHYONLY ONE KEY IS USED ONE KEY:SAME KEY FOR ENCRYPTION AND DECRYPTION
  • 13.
    WHEN COMPARED TOSYMMETRIC ,ASYMMETRIC PROCESS IS SLOW i.e BECAUSE ITS USES TWO KEYS  PUBLIC KEY:USED FOR ENCRYPTION  PRIVATE KEY : USED FOR DECRYPTION
  • 15.
    SYMMETRIC ASYMMETRIC  ÓNLYONE KEY IS USED FOR ENCRYPTION AND DECRYPTION  TWO KEYS ARE USED FOR ENCRYPTION AND DECRYPTION  ALGORITHM IS LESS COMPLEX AND FASTER  ALGORITHM IS MORE COMPLEX AND SLOWER  TEXT IS USUAL OR LESS THAN THE REAL TEXT SIZE  THE SIZE OF TEXT IS MORE THAN THE ORIGINAL TEXT SIZE  MAINLY FOR ENCRYPTION AND DECRYPTION.CANNOT BE USED FOR DIGITAL SIGNATURES  CAN BE USED FOR ENCRYPTION AND DECRYPTION AS WELL AS FOR DIGITAL SIGNATURES
  • 16.
     SECRECY INTRANSMISSION SECRECY IN STORAGE  AUTHENTICATION  INTEGRITY  NONREPUDIATION
  • 17.
     ELECTRONIC SIGNATURE. ELECTRONIC CASH.  TIME STAMPING.  DISK ENCRYPTION.  SECURE NETWORK COMMUNICATION
  • 18.
     CASH WITHDRAWALFROM ATM  PAY TV  EMAIL  FILE STORAGE  SECURE WEB BROWSING  GSM MOBILE PHONE  WHATSAPP
  • 19.
     AS WILLHAVE BECOME CLEAR,CRYPTOGRAPHY IS LITERALLY EVERYWHERE, IT PLAYS A QUIET BUT IMPORTANT ROLE IN MANY DAY-TO- DAY ACTIVITIES.  THIS TECHNOLOGY IS A BOON FOR THE NEXT GENERATION.