SlideShare a Scribd company logo
1 of 15
Dr. Emasushan Minj
Assistant Professor
St. Xavier’s College,
Mahuadanr, Latehar
Nilamber Pitamber University
 Cryptography
 History of cryptography
 Classical cryptography
 Modern cryptography
 Types
Symmetric cryptography
Asymmetric cryptography
 Pigpen cipher
 Application
 Conclusion
 Cryptography Greek: kryptós "hidden, secret“ ; and graphein,
"to write“.
 It is the practice and study of techniques for secure
communication in the presence of third parties
called adversaries.
 Constructing and analyzing protocols that prevent third
parties or the public from reading private messages; various
aspects in information security such as
data confidentiality, data integrity, authentication, and non-
repudiation are central to modern cryptography.
 There are three eras in the history of cryptography:
◦ Manual era
◦ Mechanical era
◦ Modern era
 Manual era refers to Pen and paper Cryptography and dates
back to 2000 B.C. eg: Scytale, Atbash, Caesar and Vigenere.
 Mechanical era refers to the invention of cipher machines.
Eg: Japanese Red and purple machines, German
Enigma.modern era of cryptography refers to computers.
 There are infinity permutations of cryptography available
using computers. Eg: Lucifer, Rijndael, RSA, ElGamal
 The main classical cipher types are transposition ciphers,
which rearrange the order of letters in a message and
substitution ciphers, which symmetrically replace letters
with other letters.
 Example: ‘hello world’ becomes ‘ehlol owrld’ in a
trivially simple rearrangement scheme.
A cipher (or cypher) is an algorithm for performing
encryption or decryption- a series of well-defined steps
that can be followed as a procedure.
 An early substitution cipher was the Caesar cipher, in which each
letter in the plain text was reported by a letter some fixed
number of positions further down the alphabet.
 Suetonius reported that Julius Caesar used it with a shift of three to
communicate with his generals.
Reconstructed ancient Greek scytale
an early cipher device
 The development of digital computer and electronics after
world war II made possible much more complex ciphers.
 Futhermore, computers allowed for the encryption of any
kind of data represent able in any binary format, unlike
classical ciphers which only encrypted written language
text: this was new and significant.
German Lorenz cipher machine,
used in world war II to encrypt very-high-level general staff
messages
 Todays fine example of cryptography is
Credit card with smart-card capabilities.3-5mm chip
embedded in the card.
The basic elements of cryptography are:
1. Encryption
2. Decryption
3. Key
The modern field of cryptography can be divided into several
areas of study:
Symmetric key cryptography:
It refers to encryption methods in which both the sender
and receiver share the same key.
Asymmetric or Public key cryptography:
It refers to encryption methods in which both the sender and
receiver share the different keys.
 Defense services
 Secure data manipulation
 E-commerce
 Internet payment systems
 Data security
 ATM
 E-mail
 Secure remote access
 ISDN
 PEM
 PGD
 Smart Cards
 By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access control and
availability of data is maintained.
Cryptography

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Key management
Key managementKey management
Key management
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Web security
Web securityWeb security
Web security
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 

Similar to Cryptography

Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Cryptography
CryptographyCryptography
CryptographyHira Khan
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN
 
Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)Sean O'Mahoney
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Yekini Nureni
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 

Similar to Cryptography (20)

Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Cryptography
CryptographyCryptography
Cryptography
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)Intro to Cryptography (Futures Friday)
Intro to Cryptography (Futures Friday)
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography
CryptographyCryptography
Cryptography
 

More from EmaSushan

Rolling Circle Replication
Rolling Circle ReplicationRolling Circle Replication
Rolling Circle ReplicationEmaSushan
 
S1 Nuclease Mapping
S1 Nuclease MappingS1 Nuclease Mapping
S1 Nuclease MappingEmaSushan
 
Ramachandran Plot
Ramachandran PlotRamachandran Plot
Ramachandran PlotEmaSushan
 
Ascent of sap (plant physiology)
Ascent of sap (plant physiology)Ascent of sap (plant physiology)
Ascent of sap (plant physiology)EmaSushan
 
Transport in plant (Plant physiology)
Transport in plant (Plant physiology)Transport in plant (Plant physiology)
Transport in plant (Plant physiology)EmaSushan
 
Methods of illustrating evolutionary relationship
Methods of illustrating evolutionary relationshipMethods of illustrating evolutionary relationship
Methods of illustrating evolutionary relationshipEmaSushan
 
Co-evolution of angiosperms and animals
Co-evolution of angiosperms and animalsCo-evolution of angiosperms and animals
Co-evolution of angiosperms and animalsEmaSushan
 
Operational taxonomic unit (OTUs)
Operational taxonomic unit (OTUs)Operational taxonomic unit (OTUs)
Operational taxonomic unit (OTUs)EmaSushan
 
Numerical taxonomy
Numerical taxonomyNumerical taxonomy
Numerical taxonomyEmaSushan
 
Functional aspects of ecosystem
Functional aspects of ecosystemFunctional aspects of ecosystem
Functional aspects of ecosystemEmaSushan
 
Semiconservative DNA replication
Semiconservative  DNA replicationSemiconservative  DNA replication
Semiconservative DNA replicationEmaSushan
 
Various model of DNA replication
Various model of DNA replicationVarious model of DNA replication
Various model of DNA replicationEmaSushan
 
Replication of DNA
Replication of DNAReplication of DNA
Replication of DNAEmaSushan
 
Semiconservative replication
Semiconservative replicationSemiconservative replication
Semiconservative replicationEmaSushan
 
Telomere replication
Telomere replicationTelomere replication
Telomere replicationEmaSushan
 
DNA replication
DNA replicationDNA replication
DNA replicationEmaSushan
 

More from EmaSushan (20)

Rolling Circle Replication
Rolling Circle ReplicationRolling Circle Replication
Rolling Circle Replication
 
S1 Nuclease Mapping
S1 Nuclease MappingS1 Nuclease Mapping
S1 Nuclease Mapping
 
Ramachandran Plot
Ramachandran PlotRamachandran Plot
Ramachandran Plot
 
Ascent of sap (plant physiology)
Ascent of sap (plant physiology)Ascent of sap (plant physiology)
Ascent of sap (plant physiology)
 
Transport in plant (Plant physiology)
Transport in plant (Plant physiology)Transport in plant (Plant physiology)
Transport in plant (Plant physiology)
 
Methods of illustrating evolutionary relationship
Methods of illustrating evolutionary relationshipMethods of illustrating evolutionary relationship
Methods of illustrating evolutionary relationship
 
Co-evolution of angiosperms and animals
Co-evolution of angiosperms and animalsCo-evolution of angiosperms and animals
Co-evolution of angiosperms and animals
 
Angiosperms
AngiospermsAngiosperms
Angiosperms
 
Operational taxonomic unit (OTUs)
Operational taxonomic unit (OTUs)Operational taxonomic unit (OTUs)
Operational taxonomic unit (OTUs)
 
Numerical taxonomy
Numerical taxonomyNumerical taxonomy
Numerical taxonomy
 
Data mining
Data miningData mining
Data mining
 
Cladistic
CladisticCladistic
Cladistic
 
Functional aspects of ecosystem
Functional aspects of ecosystemFunctional aspects of ecosystem
Functional aspects of ecosystem
 
Cot curve
Cot curve Cot curve
Cot curve
 
Semiconservative DNA replication
Semiconservative  DNA replicationSemiconservative  DNA replication
Semiconservative DNA replication
 
Various model of DNA replication
Various model of DNA replicationVarious model of DNA replication
Various model of DNA replication
 
Replication of DNA
Replication of DNAReplication of DNA
Replication of DNA
 
Semiconservative replication
Semiconservative replicationSemiconservative replication
Semiconservative replication
 
Telomere replication
Telomere replicationTelomere replication
Telomere replication
 
DNA replication
DNA replicationDNA replication
DNA replication
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Cryptography

  • 1. Dr. Emasushan Minj Assistant Professor St. Xavier’s College, Mahuadanr, Latehar Nilamber Pitamber University
  • 2.  Cryptography  History of cryptography  Classical cryptography  Modern cryptography  Types Symmetric cryptography Asymmetric cryptography  Pigpen cipher  Application  Conclusion
  • 3.  Cryptography Greek: kryptós "hidden, secret“ ; and graphein, "to write“.  It is the practice and study of techniques for secure communication in the presence of third parties called adversaries.  Constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non- repudiation are central to modern cryptography.
  • 4.  There are three eras in the history of cryptography: ◦ Manual era ◦ Mechanical era ◦ Modern era  Manual era refers to Pen and paper Cryptography and dates back to 2000 B.C. eg: Scytale, Atbash, Caesar and Vigenere.  Mechanical era refers to the invention of cipher machines. Eg: Japanese Red and purple machines, German Enigma.modern era of cryptography refers to computers.  There are infinity permutations of cryptography available using computers. Eg: Lucifer, Rijndael, RSA, ElGamal
  • 5.  The main classical cipher types are transposition ciphers, which rearrange the order of letters in a message and substitution ciphers, which symmetrically replace letters with other letters.  Example: ‘hello world’ becomes ‘ehlol owrld’ in a trivially simple rearrangement scheme. A cipher (or cypher) is an algorithm for performing encryption or decryption- a series of well-defined steps that can be followed as a procedure.
  • 6.
  • 7.  An early substitution cipher was the Caesar cipher, in which each letter in the plain text was reported by a letter some fixed number of positions further down the alphabet.  Suetonius reported that Julius Caesar used it with a shift of three to communicate with his generals. Reconstructed ancient Greek scytale an early cipher device
  • 8.
  • 9.  The development of digital computer and electronics after world war II made possible much more complex ciphers.  Futhermore, computers allowed for the encryption of any kind of data represent able in any binary format, unlike classical ciphers which only encrypted written language text: this was new and significant. German Lorenz cipher machine, used in world war II to encrypt very-high-level general staff messages
  • 10.  Todays fine example of cryptography is Credit card with smart-card capabilities.3-5mm chip embedded in the card. The basic elements of cryptography are: 1. Encryption 2. Decryption 3. Key
  • 11. The modern field of cryptography can be divided into several areas of study: Symmetric key cryptography: It refers to encryption methods in which both the sender and receiver share the same key.
  • 12. Asymmetric or Public key cryptography: It refers to encryption methods in which both the sender and receiver share the different keys.
  • 13.  Defense services  Secure data manipulation  E-commerce  Internet payment systems  Data security  ATM  E-mail  Secure remote access  ISDN  PEM  PGD  Smart Cards
  • 14.  By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained.