SlideShare a Scribd company logo
1 of 15
CRYPTOGRAPHY
CONTENTS
• What is Cryptography ?
• Types of Cryptographic Techniques
• Why Different Encryption Techniques ?
• Drawbacks of Classical Cryptography
• Need for New Techniques
• New Trends in Cryptography
• Conclusion
What is Cryptography ?
• Cryptography is the practice and study of hiding information.
• It is a branch of both mathematics and computer science , and is affiliated
  closely with information theory, computer security, and engineering.
• Cryptography is used in applications present in technologically advanced
  societies.
• Ex: ATM cards, computer passwords, and electronic commerce etc.
Types of Cryptographic Techniques
• They are categorized based on the number of keys that are employed for
  encryption and decryption.
• The three types are :-
   •   Secret Key Cryptography
   •   Public Key Cryptography
   •   Hash Functions
Secret Key Cryptography
• Secret-key Cryptography involves using the same key for encryption and
  decryption.




• Key used for Encryption must be as long as the message.
• The main disadvantages of Secret Key Cryptography is exchange of keys.
Public Key Cryptography
• Public-key cryptography requires two separate keys, one of which is secret
  and one of which is public.
• In this public key is used for encryption and private key is used for decryption.
Hash Functions
•It does not use any key for encryption.
•It uses a mathematical transformation to irreversibly "encrypt" information.
•Here the message is converted into a fixed length hash value.
Why Different Encryption
                 Techniques ?
•Hash Function are used for ensuring data integrity.
•Secret key cryptography is ideally suitable for encrypting messages.
•Public key cryptography is also used for encrypting messages but here different
keys are used for encryption and decryption, so it is more secured than secret
key cryptography.
Drawbacks of Classical
                   Cryptography
•Here the Encryption and Decryption Algorithms are publicly available.
•The privacy of the data transmission depends only on secrecy of a key.
•Thus if the key is revealed then the data can be compromised.
Need for new Techniques
•Today everything is on the internet.
•Thus Security plays a vital role in maintaining data.
•The older techniques are vulnerable to attacks .
•So to keep the data secure new techniques are required which are not
vulnerable.
New Trends in Cryptography
•The two new Technologies include :
 • Elliptic Curve Cryptography
 • Quantum Cryptography
 • Pairing based cryptography
Elliptic Curve Cryptography
Elliptic Curve Cryptography was proposed in 1985 by Victor Miller.
Two Points P and Q are given where Q is the public key.
Consider an integer n such that P=nQ .
An attacker might know P and Q but it is very difficult to find n which is the private key.
Quantum cryptography
It describes use of quantum mechanical effects to perform cryptographic tasks
Quantum communication to securely exchange a key
Quantum computers can only break into such encryption schemes
Pairing based cryptography
Pairs elements of two groups to construct a hybrid cryptographic system
Eg bilinear mapping
Using two or more vectors to yield a third vector to be used as key
CONCLUSION

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Hash Function
Hash FunctionHash Function
Hash Function
 
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
CNS - Unit - 2 - Stream Ciphers and Block CiphersCNS - Unit - 2 - Stream Ciphers and Block Ciphers
CNS - Unit - 2 - Stream Ciphers and Block Ciphers
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 

Viewers also liked

Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaClientSide
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Mohamed Loey
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Reportshahparin
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architectureAbhijeet Singh
 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography
CryptographyCryptography
Cryptography
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 
Classical cipher
Classical cipherClassical cipher
Classical cipher
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architecture
 

Similar to Cryptography

information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdfwondimagegndesta
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxSamiDan3
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityShanthi Mathan
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Security
SecuritySecurity
Security
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
Cryptography
CryptographyCryptography
Cryptography
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Network security
Network securityNetwork security
Network security
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 

More from أحلام انصارى

Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures أحلام انصارى
 

More from أحلام انصارى (20)

Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 

Cryptography

  • 2. CONTENTS • What is Cryptography ? • Types of Cryptographic Techniques • Why Different Encryption Techniques ? • Drawbacks of Classical Cryptography • Need for New Techniques • New Trends in Cryptography • Conclusion
  • 3. What is Cryptography ? • Cryptography is the practice and study of hiding information. • It is a branch of both mathematics and computer science , and is affiliated closely with information theory, computer security, and engineering. • Cryptography is used in applications present in technologically advanced societies. • Ex: ATM cards, computer passwords, and electronic commerce etc.
  • 4. Types of Cryptographic Techniques • They are categorized based on the number of keys that are employed for encryption and decryption. • The three types are :- • Secret Key Cryptography • Public Key Cryptography • Hash Functions
  • 5. Secret Key Cryptography • Secret-key Cryptography involves using the same key for encryption and decryption. • Key used for Encryption must be as long as the message. • The main disadvantages of Secret Key Cryptography is exchange of keys.
  • 6. Public Key Cryptography • Public-key cryptography requires two separate keys, one of which is secret and one of which is public. • In this public key is used for encryption and private key is used for decryption.
  • 7. Hash Functions •It does not use any key for encryption. •It uses a mathematical transformation to irreversibly "encrypt" information. •Here the message is converted into a fixed length hash value.
  • 8. Why Different Encryption Techniques ? •Hash Function are used for ensuring data integrity. •Secret key cryptography is ideally suitable for encrypting messages. •Public key cryptography is also used for encrypting messages but here different keys are used for encryption and decryption, so it is more secured than secret key cryptography.
  • 9. Drawbacks of Classical Cryptography •Here the Encryption and Decryption Algorithms are publicly available. •The privacy of the data transmission depends only on secrecy of a key. •Thus if the key is revealed then the data can be compromised.
  • 10. Need for new Techniques •Today everything is on the internet. •Thus Security plays a vital role in maintaining data. •The older techniques are vulnerable to attacks . •So to keep the data secure new techniques are required which are not vulnerable.
  • 11. New Trends in Cryptography •The two new Technologies include : • Elliptic Curve Cryptography • Quantum Cryptography • Pairing based cryptography
  • 12. Elliptic Curve Cryptography Elliptic Curve Cryptography was proposed in 1985 by Victor Miller. Two Points P and Q are given where Q is the public key. Consider an integer n such that P=nQ . An attacker might know P and Q but it is very difficult to find n which is the private key.
  • 13. Quantum cryptography It describes use of quantum mechanical effects to perform cryptographic tasks Quantum communication to securely exchange a key Quantum computers can only break into such encryption schemes
  • 14. Pairing based cryptography Pairs elements of two groups to construct a hybrid cryptographic system Eg bilinear mapping Using two or more vectors to yield a third vector to be used as key