SlideShare a Scribd company logo
Institute of Information Technology &
              Management



                        presentation
                            On
                       Cryptography

 Submitted to:-                  Submitted by:-
 D.D Shrivastava Sir             Suraj Shukla
 Dept cs & it                    0915IT091060
                                 IT 3rd year
What is Cryptography
• Cryptography is the science of encrypting and
  decrypting written communication. It comes from the
  Greek word “kryptos ,” meaning hidden, and “graphia
  ,” meaning writing.
• Cryptography is a method of storing and transmitting
  data in a form that only those it is intended for can
  read and process. It is a science of protecting
  information by encoding it into an unreadable format.
  Cryptography is an effective way of protecting
  sensitive information as it is stored on media or
  transmitted through network communication paths
History of Cryptography
• Cryptography has roots that began around 2000
  B.C. in Egypt when hieroglyphics were used to
  decorate tombs to tell the story of the life of the
  deceased.
• A Hebrew cryptographic method required the
  alphabet to be flipped so that each letter in the
  original alphabet is mapped to a different letter
  in the flipped alphabet. The encryption method
  was called atbash.
• ABCDEFGHI JK LMNOPQ R STU VW XYZ
• ZYXWVUTSR QP ONMLKJ I HGF ED CBA
• Security= hvxfirgb
Continue…
Around 400 B.C., the Spartans used a system of encrypting information by
writing a message on a sheet of papyrus, which was wrapped around a staff.
Continue…
• During World War II, simplistic encryption
  device called Enigma machine used for
  tactical communication
Cryptosystem Services
•   Confidentiality
•   Integrity
•   Authenticity
•   Nonrepudiation
•   Access Control
Keyspace
• An algorithm contains a keyspace, which is a
  range of values that can be used to construct a
  key. The key is made up of random values
  within the keyspace range. The larger the
  keyspace, the more available values can be
  used to represent different keys, and the more
  random the keys are, the harder it is for
  intruders to figure them out.
Generation of key
Types of Cryptography
• Stream-based Ciphers-a stream cipher treats the
  message as a stream of bits or bytes and performs
  mathematical functions on them individually.
• Block Ciphers- When a block cipher algorithm is
  used for encryption and decryption purposes, the
  message is divided into blocks of bits. These blocks
  are then put through substitution , transposition ,
  and other mathematical functions.
Cryptographic Methods

• Symmetric
   – Same key for encryption and decryption
   – Key distribution problem
• Asymmetric
   – Mathematically related key pairs for encryption
     and decryption
   – Public and private keys
• Hybrid Encryption Methods(Public Key Cryptography)
Symmetric Algorithms
• Data Encryption Standard (DES)
  – Modes: ECB, CBC, CFB, OFB, CM
• Triple-DES (3DES)
• Advanced Encryption Standard (AES)
• International Data Encryption Algorithm
  (IDEA)
• Blowfish
Example of Symmetric algorithms
Strength and Weakness
• Strengths
     • Much faster than asymmetric systems
     • Hard to break if using a large key size
• Weaknesses
     • Key distribution It requires a secure
  mechanism to deliver keys properly.
     • Limited security It can provide
  confidentiality, but not authenticity.
Asymmetric Algorithms

• RSA(Ron Rivest, Adi Shamir, and Leonard Adleman)
• El Gamal
• Elliptic Curve Cryptography (ECC)
Example of Asymmetric algorithms
Strength and Weakness
• Strengths
    • Better key distribution than symmetric
  systems
    • Better scalability than symmetric systems
    • Can provide confidentiality, authentication,
  and nonrepudiation
• Weaknesses
    • Works much slower than symmetric systems
Hybrid Encryption
In the hybrid approach, the two different
approaches are used in a complementary
manner, with each performing a different
function. A symmetric algorithm creates keys
that are used for encrypting bulk data and an
asymmetric algorithm creates keys that are
used for automated key distribution.
Example of Hybrid Encryption
This is all about Cryptography

          THANK YOU



        Any Queries

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
Pratiksha Patil
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography
CryptographyCryptography
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 
Cryptography
CryptographyCryptography
Cryptography
PPT4U
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 
Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
Perfect Training Center
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Technical Hub
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
Ancy Mariam Babu
 
Cryptography ppt
Cryptography pptCryptography ppt

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal Cryptography ppt by vaishnavi khandelwal
Cryptography ppt by vaishnavi khandelwal
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 

Similar to Cryptography

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
CryptographyCryptography
Cryptography
Nishant Pahad
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
KennedyKiplangat1
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Cryptography
CryptographyCryptography
Cryptography
Neeraj Mali
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Shanthi Mathan
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
Mathan Gopal
 
Cryptography
CryptographyCryptography
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
NithiShree5
 
Crytography
CrytographyCrytography
Crytography
Anchal Kumar
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
 
Network security
Network securityNetwork security
Network security
ABHISHEK KUMAR
 

Similar to Cryptography (20)

Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Crytography
CrytographyCrytography
Crytography
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 

Cryptography

  • 1. Institute of Information Technology & Management presentation On Cryptography Submitted to:- Submitted by:- D.D Shrivastava Sir Suraj Shukla Dept cs & it 0915IT091060 IT 3rd year
  • 2. What is Cryptography • Cryptography is the science of encrypting and decrypting written communication. It comes from the Greek word “kryptos ,” meaning hidden, and “graphia ,” meaning writing. • Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through network communication paths
  • 3. History of Cryptography • Cryptography has roots that began around 2000 B.C. in Egypt when hieroglyphics were used to decorate tombs to tell the story of the life of the deceased. • A Hebrew cryptographic method required the alphabet to be flipped so that each letter in the original alphabet is mapped to a different letter in the flipped alphabet. The encryption method was called atbash. • ABCDEFGHI JK LMNOPQ R STU VW XYZ • ZYXWVUTSR QP ONMLKJ I HGF ED CBA • Security= hvxfirgb
  • 4. Continue… Around 400 B.C., the Spartans used a system of encrypting information by writing a message on a sheet of papyrus, which was wrapped around a staff.
  • 5. Continue… • During World War II, simplistic encryption device called Enigma machine used for tactical communication
  • 6. Cryptosystem Services • Confidentiality • Integrity • Authenticity • Nonrepudiation • Access Control
  • 7. Keyspace • An algorithm contains a keyspace, which is a range of values that can be used to construct a key. The key is made up of random values within the keyspace range. The larger the keyspace, the more available values can be used to represent different keys, and the more random the keys are, the harder it is for intruders to figure them out.
  • 9. Types of Cryptography • Stream-based Ciphers-a stream cipher treats the message as a stream of bits or bytes and performs mathematical functions on them individually. • Block Ciphers- When a block cipher algorithm is used for encryption and decryption purposes, the message is divided into blocks of bits. These blocks are then put through substitution , transposition , and other mathematical functions.
  • 10.
  • 11.
  • 12. Cryptographic Methods • Symmetric – Same key for encryption and decryption – Key distribution problem • Asymmetric – Mathematically related key pairs for encryption and decryption – Public and private keys • Hybrid Encryption Methods(Public Key Cryptography)
  • 13. Symmetric Algorithms • Data Encryption Standard (DES) – Modes: ECB, CBC, CFB, OFB, CM • Triple-DES (3DES) • Advanced Encryption Standard (AES) • International Data Encryption Algorithm (IDEA) • Blowfish
  • 14. Example of Symmetric algorithms
  • 15. Strength and Weakness • Strengths • Much faster than asymmetric systems • Hard to break if using a large key size • Weaknesses • Key distribution It requires a secure mechanism to deliver keys properly. • Limited security It can provide confidentiality, but not authenticity.
  • 16. Asymmetric Algorithms • RSA(Ron Rivest, Adi Shamir, and Leonard Adleman) • El Gamal • Elliptic Curve Cryptography (ECC)
  • 17. Example of Asymmetric algorithms
  • 18. Strength and Weakness • Strengths • Better key distribution than symmetric systems • Better scalability than symmetric systems • Can provide confidentiality, authentication, and nonrepudiation • Weaknesses • Works much slower than symmetric systems
  • 19. Hybrid Encryption In the hybrid approach, the two different approaches are used in a complementary manner, with each performing a different function. A symmetric algorithm creates keys that are used for encrypting bulk data and an asymmetric algorithm creates keys that are used for automated key distribution.
  • 20. Example of Hybrid Encryption
  • 21. This is all about Cryptography THANK YOU Any Queries

Editor's Notes

  1. RSA, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adlemanused for digital signatures and encryption. It was developed in 1978 at MIT and providesauthentication as well as encryption.