SlideShare a Scribd company logo
Cryptography




Presented To:-           Presented By:-
Mr. Anurag Sharma   Rohan Jain , CS B ,
1000210077
Overview
•   Cryptography………………..……….An introduction
•   Objectives………………………………….Brief Aspect
•   Terminology……………..…..To Make You Familiar
•   How………………….…………………….Demonstration
•   Methods………………………….......Public & Private
•   Implementation………………..Hashing Algorithm
•   Cryptography in Networking Security………....…
•   Applications……………………………Real Life Scope
Introduction
 The Word Cryptology is made up of “Kryptos", which means
  hidden and “Logos" which means word.
 In Laymen Words, it is an Art and science of protecting data.
 Technically, It involves logical transformation of information.
 The Principles of Cryptography are today applied to the
  encryption of fax ,television, and computer network
  communications and many other fields.
 Since the secure exchange of computer data is of great
  importance to banking, government, and commercial
  communications as well as for individuals.
Objectives
1)Confidentiality :-The information cannot be understood by
anyone for whom it was unintended.

2) Integrity :-The information cannot be altered in storage or
transit between sender and intended receiver without the
alteration being detected. (Data Is Not Corrupted).

3)Non-repudiation :-The creator/sender of the information
cannot deny at a later stage his or her intentions in the
creation or transmission of the information.

4) Authentication :-The sender and receiver can confirm each
other’s identity and the origin/destination of the information.
(Source Of Data IS Genuine).
Terminology
R   O         H          A       N         J        A            I        N
                                                                                  Plain Text(Can
                                                                              Be Variable Length)


                       Encryption Using Key                                    Using Algorithms
                                                                          (MD4,MD5,SHA-1,RSA)

                                                                                    Cipher Text
    00   B8       3c     Ef   G0 Xh        99   3d      2f



                                                                     Using Algorithm (Same As
                  Decryption Using Same                              Used To Encrypt the Text)
                           Keys


R   O         H          A      N      J        A            I        N
HOW…??
A Simple Demonstration:-Substitution Cipher
To Encode:-> S          E     C     R    E     T
Key :-> Offset the 3rd letter so the alphabets begin with it.
         So starting with:-
                           ABCDEFGHIJKLMNOPQRSTUVWXYZ
         and sliding everything by 3, we get:-
                           DEFGHIJKLMNOPQRSTUVWXYZABC
         So D=A, E=B, F=C…..and so on.
Encoded:-> V      H     F     U       H          W

To Decode:-> Provide anyone the key i.e.,
              =>Offset the 3rd letter so the alphabets begin with it.
Cryptography Methods : Modern
           Cryptography
o Symmetric-Key Cryptography.
o Asymmetric-Key Cryptography.
o Cryptanalysis.
Private(Symmetric) Cryptography
In symmetric-key encryption each end already has a secret key
(code) that it can use to encrypt a packet of information before it
is sent over the network to another computer.
Private Cryptography Methods:-
DES (Data Encryption Standard)               AES(Advanced Encryption Standard)

Older                                        Newer

Breakable                                    Unbreakable

Smaller Key (56-bit Encryption).             Bigger Key(128/192bit /256 bit Encryption).

7*10^16 Key Combinations.                    3*10^35 Key Combinations.

Smaller Block Size (64 bits).                Larger Block Size (128bits).

For DES with 64 bits, the maximum amount For AES with 128 bits, the maximum
of data that can be transferred with a single amount of data that can be transferred
encryption key is 32GB.                       with a single encryption key is 256 EB.
Public/Asymmetric Cryptography
Asymmetric/Public encryption uses two different keys at once
i.e., combination of a private key and a public key. The private
key is known only to your computer while the public key is
given by your computer to any computer that wants to
communicate securely with it.
 To decode an
encrypted Message a
computer must use the
public key provided by
originating computer,
and its own private key
Cryptanalysis
   The Study of methods to break Cryptosystems.
   Often targeted at obtaining a key.
   Cryptanalysis Attacks:-
o   Brute force
    o Trying all key values in the keyspace.
o Frequency Analysis
    o Guess values based on frequency of occurrence.
o Dictionary Attack
    o Find plaintext based on common words.
Implementation of Encryption Keys
             :Hash Function
A hash function is any algorithm or subroutine that maps large
data sets of variable length to smaller data sets of a fixed
length. For example, a person's name, having a variable
length, could be hashed to a single integer.
Basic Idea:-
Input Number                                     10,667
Hashing Function                          Input# x 143
Hash Value                                1,525,381

Public keys generally use more complex algorithms and very
large hash values for encrypting, including 40-bit or even 128-
bit numbers. A 128-bit number has a possible 2128.
• The values returned by a hash function are called hash
  values, hash codes, digest ,hash sums, checksums or
  simply hashes.
• A Cryptographic hash function (specifically, SHA-1) at work.
  Note that even small changes in the source input (here in
  the word "over") drastically change the resulting output.
               V
                   U
Cryptography in Networking
 Transport Layer Security (TLS) and its predecessor, Secure
  Sockets Layer (SSL), are cryptographic protocols that
  provide communication security over the Internet.
 Several versions of the protocols are in widespread use in
  applications such as web browsing, electronic mail, Internet
  faxing, instant messaging and voice-over-IP (VoIP).
 When you're accessing sensitive information, such as an
  online bank account or a payment transfer service like PayPal
  or Google Checkout.
The client request the SSL connection by sending the request.
Server provides it’s secure certificate to client to show it’s
authenticity.
Client validates the certificate and request a one time session
with server.
Server completes the SSL handshake and the session begins.
Applications

•   ATM Cards
•   E-Commerce
•   Computer Passwords
•   Electronic Fund Transfer
•   Digital Signatures
•   Network Security
•   Storage Integrity
References
    http://en.wikipedia.org/wiki/Cryptography

http://en.wikipedia.org/wiki/Cryptographic_hash
                    function

http://computer.howstuffworks.com/encryption.ht
                      m

http://en.wikipedia.org/wiki/Secure_Sockets_Layer
Queries ??

More Related Content

What's hot

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
Itt project
Itt projectItt project
Itt project
Harish Kumar
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHP
Enrico Zimuel
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
cryptography
cryptographycryptography
cryptography
Jai Nathwani
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Ramki M
 
Is case study
Is   case studyIs   case study
Is case study
Shehrevar Davierwala
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
prasenjeetd
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
 

What's hot (20)

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Itt project
Itt projectItt project
Itt project
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHP
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 

Similar to Cryptography

Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
Jack Davis
 
Cryptography
CryptographyCryptography
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
AFRINIC
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
 
Day5
Day5Day5
Day5
Jai4uk
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
SurendraBasnet6
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Kannan Ravindran
 
Digital signatures
Digital signaturesDigital signatures
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
newbie2019
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Moein
MoeinMoein
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro1
 
Cryptography
CryptographyCryptography
Cryptography
Shray Jali
 
Cryptography
CryptographyCryptography
Cryptography
Pratiksha Patil
 
Encryption
EncryptionEncryption
Encryption
Vijay Kumar
 

Similar to Cryptography (20)

Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Day5
Day5Day5
Day5
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Moein
MoeinMoein
Moein
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

Cryptography

  • 1. Cryptography Presented To:- Presented By:- Mr. Anurag Sharma Rohan Jain , CS B , 1000210077
  • 2. Overview • Cryptography………………..……….An introduction • Objectives………………………………….Brief Aspect • Terminology……………..…..To Make You Familiar • How………………….…………………….Demonstration • Methods………………………….......Public & Private • Implementation………………..Hashing Algorithm • Cryptography in Networking Security………....… • Applications……………………………Real Life Scope
  • 3. Introduction  The Word Cryptology is made up of “Kryptos", which means hidden and “Logos" which means word.  In Laymen Words, it is an Art and science of protecting data.  Technically, It involves logical transformation of information.  The Principles of Cryptography are today applied to the encryption of fax ,television, and computer network communications and many other fields.  Since the secure exchange of computer data is of great importance to banking, government, and commercial communications as well as for individuals.
  • 4. Objectives 1)Confidentiality :-The information cannot be understood by anyone for whom it was unintended. 2) Integrity :-The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. (Data Is Not Corrupted). 3)Non-repudiation :-The creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information. 4) Authentication :-The sender and receiver can confirm each other’s identity and the origin/destination of the information. (Source Of Data IS Genuine).
  • 5. Terminology R O H A N J A I N Plain Text(Can Be Variable Length) Encryption Using Key Using Algorithms (MD4,MD5,SHA-1,RSA) Cipher Text 00 B8 3c Ef G0 Xh 99 3d 2f Using Algorithm (Same As Decryption Using Same Used To Encrypt the Text) Keys R O H A N J A I N
  • 6. HOW…?? A Simple Demonstration:-Substitution Cipher To Encode:-> S E C R E T Key :-> Offset the 3rd letter so the alphabets begin with it. So starting with:- ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything by 3, we get:- DEFGHIJKLMNOPQRSTUVWXYZABC So D=A, E=B, F=C…..and so on. Encoded:-> V H F U H W To Decode:-> Provide anyone the key i.e., =>Offset the 3rd letter so the alphabets begin with it.
  • 7. Cryptography Methods : Modern Cryptography o Symmetric-Key Cryptography. o Asymmetric-Key Cryptography. o Cryptanalysis.
  • 8. Private(Symmetric) Cryptography In symmetric-key encryption each end already has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer.
  • 9. Private Cryptography Methods:- DES (Data Encryption Standard) AES(Advanced Encryption Standard) Older Newer Breakable Unbreakable Smaller Key (56-bit Encryption). Bigger Key(128/192bit /256 bit Encryption). 7*10^16 Key Combinations. 3*10^35 Key Combinations. Smaller Block Size (64 bits). Larger Block Size (128bits). For DES with 64 bits, the maximum amount For AES with 128 bits, the maximum of data that can be transferred with a single amount of data that can be transferred encryption key is 32GB. with a single encryption key is 256 EB.
  • 10. Public/Asymmetric Cryptography Asymmetric/Public encryption uses two different keys at once i.e., combination of a private key and a public key. The private key is known only to your computer while the public key is given by your computer to any computer that wants to communicate securely with it.  To decode an encrypted Message a computer must use the public key provided by originating computer, and its own private key
  • 11. Cryptanalysis  The Study of methods to break Cryptosystems.  Often targeted at obtaining a key.  Cryptanalysis Attacks:- o Brute force o Trying all key values in the keyspace. o Frequency Analysis o Guess values based on frequency of occurrence. o Dictionary Attack o Find plaintext based on common words.
  • 12. Implementation of Encryption Keys :Hash Function A hash function is any algorithm or subroutine that maps large data sets of variable length to smaller data sets of a fixed length. For example, a person's name, having a variable length, could be hashed to a single integer. Basic Idea:- Input Number 10,667 Hashing Function Input# x 143 Hash Value 1,525,381 Public keys generally use more complex algorithms and very large hash values for encrypting, including 40-bit or even 128- bit numbers. A 128-bit number has a possible 2128.
  • 13. • The values returned by a hash function are called hash values, hash codes, digest ,hash sums, checksums or simply hashes. • A Cryptographic hash function (specifically, SHA-1) at work. Note that even small changes in the source input (here in the word "over") drastically change the resulting output. V U
  • 14. Cryptography in Networking  Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.  Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).  When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout.
  • 15. The client request the SSL connection by sending the request. Server provides it’s secure certificate to client to show it’s authenticity. Client validates the certificate and request a one time session with server. Server completes the SSL handshake and the session begins.
  • 16. Applications • ATM Cards • E-Commerce • Computer Passwords • Electronic Fund Transfer • Digital Signatures • Network Security • Storage Integrity
  • 17. References http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Cryptographic_hash function http://computer.howstuffworks.com/encryption.ht m http://en.wikipedia.org/wiki/Secure_Sockets_Layer