SlideShare a Scribd company logo
1 of 20
Download to read offline
Created By : Rahul Khanvani
Roll No : 47
Department Of Computer Science
Cryptography:
Securing the Information.
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
» EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?
 Does it look like nonsense to you ?
 Did you notice that I asked you the same question twice ?
 Confused ?
» Replace Each word With its Alphabet used before.
» The Cryptography is Simple 
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Cryptography is the art and science of converting ordinary information
into gibberish and converting it back to its original, meaningful form.
» Its Amazing how rotating the alphabets by even just one position is
enough to confuse human mind !
» We Call It Rotating Words.
» To convert data in meaningful form you need an algorithm ,
» you can also create your own small algorithm.
What Is Cryptography ?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» If You Say No Then I Can Say You May B Don’t Use Cryptography.
 Do You Use Gmail ?
 Do You use Facebook ?
 Have you Ever Opened a File Containing Password ?
 Did U Use HTTPS Site ?
 Do You Fill Forms on Internet ?
» Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A
Kind Of Cryptogrpahy.
 E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives.
Who Uses Cryptography ?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Plaintext – A message in its natural format readable by an attacker
» Cipher text – Message altered to be unreadable by anyone except the
intended recipients
» Key – Sequence that controls the operation and behavior of the
cryptographic algorithm
» Key-space – Total number of possible values of keys in a crypto
algorithm
» Encryption
 Plain text  Cipher text
» Decryption
 Cipher text  Plain text
Terms Used In Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Defending against external/internal hackers
» Securing E-commerce
» Securing bank accounts/electronic transfers
» Securing intellectual property
Information Security for…
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Pervasiveness of email/networks
» Online storage of sensitive information
» Insecure technologies (e.g. wireless)
» Trend towards paperless society
» Weak legal protection of email privacy.
Threats to Information Security
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
How To Send A Secure Email Or Password Protected Email?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Types Of Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Secret Writing
Steganography
Cryptography
Types of Secret Writing
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Steganography – covered writing
 – is an art of hiding information
» Popular contemporary steganography
technologies hide information in images.
Steganography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Encryption means the transformation of data by the use of
Cryptography to produce unintelligible data to ensure confidentiality
» The inverse function of encryption is called as decryption
Encryption and decryption:-
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Private (symmetric, secret) key – the same key used for
encryption/decryption
» Problem of key distribution
» How Do Both Person Agree On Same Key ?
Private Key Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Public (asymmetric) key cryptography – a public key used for encryption
and private key for decryption
» Key distribution problem solved
Public Key Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
 DES (Data Encryption Standard) and derivatives: double DES and triple DES
 IDEA (International Data Encryption Standard)
 Blowfish
 RC5 (Rivets Cipher #5)
 AES (Advance Encryption Standard)
Currently Available Crypto Algorithms (private key)
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
 RSA (Rivest, Shamir, Adleman)
 DH (Diffie-Hellman Key Agreement Algorithm)
 ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)
 RPK (Raike Public Key)
Currently Available Crypto Algorithms (public key)
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Algorithms are not theoretically unbreakable: successful attacks in the
future are possible.
» Encryption does not guarantee security!
» Many ways to beat a crypto system NOT dependent on cryptanalysis,
such as:
 Viruses, worms, hackers, etc.
 TEMPEST attacks,
 Unauthorized physical access to secret keys
» Cryptography is only one element of comprehensive computer security
How Secure are Today’s Technologies?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Thank You…
For More Visit Bnarybuzz.wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com

More Related Content

Similar to Cryptography Securing Information

Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Basic Cryptography & Security
Basic Cryptography & SecurityBasic Cryptography & Security
Basic Cryptography & SecurityHoffman Lab
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Razi Rais
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...YK Chang
 
Httpillage lascon-2015
Httpillage lascon-2015Httpillage lascon-2015
Httpillage lascon-2015forcedrequest
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...All Things Open
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in ActionJosh Sokol
 
Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.C a s e y R o s i n i
 

Similar to Cryptography Securing Information (20)

Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
Cryptography
CryptographyCryptography
Cryptography
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Basic Cryptography & Security
Basic Cryptography & SecurityBasic Cryptography & Security
Basic Cryptography & Security
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...
 
Httpillage lascon-2015
Httpillage lascon-2015Httpillage lascon-2015
Httpillage lascon-2015
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.
 

More from Rahul Khanwani

Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On GoogleRahul Khanwani
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examplesRahul Khanwani
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) modelRahul Khanwani
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algorithamRahul Khanwani
 
Data compression introduction
Data compression introductionData compression introduction
Data compression introductionRahul Khanwani
 

More from Rahul Khanwani (8)

Online examination system
Online examination systemOnline examination system
Online examination system
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On Google
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examples
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) model
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algoritham
 
Data compression introduction
Data compression introductionData compression introduction
Data compression introduction
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Google glass
Google glassGoogle glass
Google glass
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Cryptography Securing Information

  • 1. Created By : Rahul Khanvani Roll No : 47 Department Of Computer Science Cryptography: Securing the Information. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 2. Introduction Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 3. Introduction » EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?  Does it look like nonsense to you ?  Did you notice that I asked you the same question twice ?  Confused ? » Replace Each word With its Alphabet used before. » The Cryptography is Simple  Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 4. » Cryptography is the art and science of converting ordinary information into gibberish and converting it back to its original, meaningful form. » Its Amazing how rotating the alphabets by even just one position is enough to confuse human mind ! » We Call It Rotating Words. » To convert data in meaningful form you need an algorithm , » you can also create your own small algorithm. What Is Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 5. » If You Say No Then I Can Say You May B Don’t Use Cryptography.  Do You Use Gmail ?  Do You use Facebook ?  Have you Ever Opened a File Containing Password ?  Did U Use HTTPS Site ?  Do You Fill Forms on Internet ? » Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A Kind Of Cryptogrpahy.  E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives. Who Uses Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 6. » Plaintext – A message in its natural format readable by an attacker » Cipher text – Message altered to be unreadable by anyone except the intended recipients » Key – Sequence that controls the operation and behavior of the cryptographic algorithm » Key-space – Total number of possible values of keys in a crypto algorithm » Encryption  Plain text  Cipher text » Decryption  Cipher text  Plain text Terms Used In Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 7. » Defending against external/internal hackers » Securing E-commerce » Securing bank accounts/electronic transfers » Securing intellectual property Information Security for… Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 8. » Pervasiveness of email/networks » Online storage of sensitive information » Insecure technologies (e.g. wireless) » Trend towards paperless society » Weak legal protection of email privacy. Threats to Information Security Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 9. How To Send A Secure Email Or Password Protected Email? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 10. Types Of Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 11. Secret Writing Steganography Cryptography Types of Secret Writing Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 12. » Steganography – covered writing  – is an art of hiding information » Popular contemporary steganography technologies hide information in images. Steganography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 13. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 14. » Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality » The inverse function of encryption is called as decryption Encryption and decryption:- Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 15. » Private (symmetric, secret) key – the same key used for encryption/decryption » Problem of key distribution » How Do Both Person Agree On Same Key ? Private Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 16. » Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption » Key distribution problem solved Public Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 17.  DES (Data Encryption Standard) and derivatives: double DES and triple DES  IDEA (International Data Encryption Standard)  Blowfish  RC5 (Rivets Cipher #5)  AES (Advance Encryption Standard) Currently Available Crypto Algorithms (private key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 18.  RSA (Rivest, Shamir, Adleman)  DH (Diffie-Hellman Key Agreement Algorithm)  ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)  RPK (Raike Public Key) Currently Available Crypto Algorithms (public key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 19. » Algorithms are not theoretically unbreakable: successful attacks in the future are possible. » Encryption does not guarantee security! » Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:  Viruses, worms, hackers, etc.  TEMPEST attacks,  Unauthorized physical access to secret keys » Cryptography is only one element of comprehensive computer security How Secure are Today’s Technologies? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 20. Thank You… For More Visit Bnarybuzz.wordpress.com Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com