SlideShare a Scribd company logo
Overview of Cryptography
"If you think cryptography can solve your problem, then
you don't understand your problem and you don't
understand cryptography."
-- Bruce Schneier
Overview of Cryptography
What is Cryptography?
 Cryptography is an often misunderstood and misused security tool.
Today more than ever, privacy is a necessary part of business
communications. The following is an overview of public key
cryptography and one of its more widely-used implementations, Pretty
Good Privacy (PGP).
Types of Cryptographic Systems
Secret Codes
 The simplest and oldest way to send a secret
message to someone. The code must be known to
the sender or recipient.
Code Phrase True Meaning
My coffee is cold
Pass the cream
Launch the missiles
Don’t launch the missiles
Types of Cryptographic Systems
Ciphers
 Substitution ciphers are the simplest type of cipher system.
 Each letter of the alphabet is assigned to a number or different letter.
 ROT13 is a commonly used cipher.
A B C D E F G H I J K L M
1 2 3 4 5 6 7 8 9 A B C . . .
Cont’d….
Types of Cryptographic Systems
One-Time Pads
 One-Time Pads uses a different key for a specific time
period.
 Truly secure, no patterns evolve.
 Most vulnerabilities due to human carelessness.
14 07 09 06 10 02 25 13 17 08 15
One-Time Pad - Shift each encrypted letter x places to the right
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
fazmyqbgnke
Encrypted Message
This is a test
Decrypted Text
Cryptographic Methods
Secret Key (symmetric) Cryptography
 A single key is used to both encrypt and decrypt a
message. A secure channel must be in place for users
to exchange this common key.
Plaintext Message
Secret Key
Encrypted Message
Secret Key
Cryptographic Methods
Public Key (asymmetric) Cryptography
 Two keys are used for this method, the public key is used to encrypt.
The private key is used to decrypt. This is used when it isn’t feasible to
securely exchange keys.
Jay’s Public Key
Jay’s Private Key
Frank
Encrypted
Message
Clear Text
Cryptographic Methods
One-Way Functions
 One-way functions:
Used to generate a fixed-length hash (also known as a message-digest) of a
file. This hash is essentially a ‘digital fingerprint’ of the file that would be sent
along with a document. The recipient would use the same method to generate
a hash. If the hashes do not match the file has been altered.
Message Crypto-Algorithm
5058f1af8388633f609cadb75a75dc9d
128 bit digital fingerprint
Pretty Good Privacy
 PGP or Pretty Good Privacy is as the name suggest a package that guarantees
privacy or in other words it is an encryption package. PGP was developed by
Phil Zimmermann.
 PGP is a dual-key or public-key cryptosystem (also known as asymmetric
cipher). One key is kept secret, the other key is made public. To communicate
with the owner of the secret key a message is encrypted with the
corresponding public key, this message can only be decrypted using the secret
key.
 When a user encrypts plaintext with PGP, PGP first compresses the plaintext
 Data compression saves modem transmission time and disk space and, more
importantly, strengthens cryptographic security.
Cont’d……..
 Compression reduces these patterns in the plaintext, thereby greatly
enhancing resistance to cryptanalysis. (Files that are too short to compress or
which don't compress well aren't compressed.)
 PGP then creates a session key, which is a one-time-only secret key. This key is
a random number generated from the random movements of your mouse and
the keystrokes you type.
 This session key works with a very secure, fast conventional encryption
algorithm to encrypt the plaintext; the result is cipher text.
 Once the data is encrypted, the session key is then encrypted to the recipient's
public key. This public key-encrypted session key is transmitted along with the
cipher text to the recipient.
•Decryption works in the reverse. The recipient's copy
of PGP uses his or her private key to recover the
temporary session key, which PGP then uses to
decrypt the conventionally-encrypted cipher text.
Digital Signature
 Digital Signature and Verification
 Digital signature is a mechanism by which a message is authenticated i.e. proving that a
 message is effectively coming from a given sender, much like a signature on a paper
 document. For instance, suppose that Alice wants to digitally sign a message to Bob. To
do
 so, she uses her private-key to encrypt the message; she then sends the message along
with
 her public-key (typically, the public key is attached to the signed message). Since Alice’s
 public-key is the only key that can decrypt that message, a successful decryption
constitutes
 a Digital Signature Verification, meaning that there is no doubt that it is Alice’s private
key
 that encrypted the message.
Cont’d…
THANK YOU SO MUCH

More Related Content

What's hot

fucking shit
fucking shitfucking shit
fucking shit
eyalrav
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
Sai Natkar
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Neha Bhambu
 
Data encryption
Data encryptionData encryption
Data encryption
Aman Jain
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography
CryptographyCryptography
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
krprashant94
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
SURBHI SAROHA
 
Ss
SsSs

What's hot (14)

fucking shit
fucking shitfucking shit
fucking shit
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Cryptography
CryptographyCryptography
Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Data encryption
Data encryptionData encryption
Data encryption
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Ss
SsSs
Ss
 

Viewers also liked

Secret Guide of Internet marketing
Secret Guide of Internet marketingSecret Guide of Internet marketing
Secret Guide of Internet marketing
thomasmary607
 
The maids ma
The maids maThe maids ma
The maids ma
The Maids MA
 
Jay shree-industries
Jay shree-industriesJay shree-industries
Jay shree-industries
Jay Shree Industries
 
RANGSUTRA final 1
RANGSUTRA final 1RANGSUTRA final 1
RANGSUTRA final 1
Shikhar Awasthi
 
Milaap Employee Engagement Deck
Milaap Employee Engagement DeckMilaap Employee Engagement Deck
Milaap Employee Engagement Deck
Milaap.org
 
The Maids PR
The Maids PRThe Maids PR
The Maids PR
Belinda Gonzalez Diaz
 
Funding your startup one step at a time
Funding your startup one step at a timeFunding your startup one step at a time
Funding your startup one step at a time
Milaap
 
E payment security – pci dss
E payment security – pci dssE payment security – pci dss
E payment security – pci dss
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
Jayaashree industries making meaning to the society
Jayaashree industries making meaning to the societyJayaashree industries making meaning to the society
Jayaashree industries making meaning to the society
Pankaj Gaurav
 
Sanitary napkins manufacturing unit
Sanitary napkins manufacturing unitSanitary napkins manufacturing unit
Sanitary napkins manufacturing unit
Venkatachalam Vaidhiyanathan
 
The social enterprise
The social enterpriseThe social enterprise
The social enterprise
McKinsey on Marketing & Sales
 

Viewers also liked (11)

Secret Guide of Internet marketing
Secret Guide of Internet marketingSecret Guide of Internet marketing
Secret Guide of Internet marketing
 
The maids ma
The maids maThe maids ma
The maids ma
 
Jay shree-industries
Jay shree-industriesJay shree-industries
Jay shree-industries
 
RANGSUTRA final 1
RANGSUTRA final 1RANGSUTRA final 1
RANGSUTRA final 1
 
Milaap Employee Engagement Deck
Milaap Employee Engagement DeckMilaap Employee Engagement Deck
Milaap Employee Engagement Deck
 
The Maids PR
The Maids PRThe Maids PR
The Maids PR
 
Funding your startup one step at a time
Funding your startup one step at a timeFunding your startup one step at a time
Funding your startup one step at a time
 
E payment security – pci dss
E payment security – pci dssE payment security – pci dss
E payment security – pci dss
 
Jayaashree industries making meaning to the society
Jayaashree industries making meaning to the societyJayaashree industries making meaning to the society
Jayaashree industries making meaning to the society
 
Sanitary napkins manufacturing unit
Sanitary napkins manufacturing unitSanitary napkins manufacturing unit
Sanitary napkins manufacturing unit
 
The social enterprise
The social enterpriseThe social enterprise
The social enterprise
 

Similar to Cryptography

PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Cryptography ppt
Cryptography pptCryptography ppt
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Asif
AsifAsif
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
Tanner Lovelace
 
cryptography
cryptographycryptography
cryptography
swatihans
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
Prabhat Kumar
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
Durgesh Malviya
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 

Similar to Cryptography (20)

PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Data encryption
Data encryptionData encryption
Data encryption
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Asif
AsifAsif
Asif
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
 
cryptography
cryptographycryptography
cryptography
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

Cryptography

  • 1. Overview of Cryptography "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography." -- Bruce Schneier
  • 2. Overview of Cryptography What is Cryptography?  Cryptography is an often misunderstood and misused security tool. Today more than ever, privacy is a necessary part of business communications. The following is an overview of public key cryptography and one of its more widely-used implementations, Pretty Good Privacy (PGP).
  • 3.
  • 4. Types of Cryptographic Systems Secret Codes  The simplest and oldest way to send a secret message to someone. The code must be known to the sender or recipient. Code Phrase True Meaning My coffee is cold Pass the cream Launch the missiles Don’t launch the missiles
  • 5. Types of Cryptographic Systems Ciphers  Substitution ciphers are the simplest type of cipher system.  Each letter of the alphabet is assigned to a number or different letter.  ROT13 is a commonly used cipher. A B C D E F G H I J K L M 1 2 3 4 5 6 7 8 9 A B C . . .
  • 7. Types of Cryptographic Systems One-Time Pads  One-Time Pads uses a different key for a specific time period.  Truly secure, no patterns evolve.  Most vulnerabilities due to human carelessness. 14 07 09 06 10 02 25 13 17 08 15 One-Time Pad - Shift each encrypted letter x places to the right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z fazmyqbgnke Encrypted Message This is a test Decrypted Text
  • 8.
  • 9. Cryptographic Methods Secret Key (symmetric) Cryptography  A single key is used to both encrypt and decrypt a message. A secure channel must be in place for users to exchange this common key. Plaintext Message Secret Key Encrypted Message Secret Key
  • 10. Cryptographic Methods Public Key (asymmetric) Cryptography  Two keys are used for this method, the public key is used to encrypt. The private key is used to decrypt. This is used when it isn’t feasible to securely exchange keys. Jay’s Public Key Jay’s Private Key Frank Encrypted Message Clear Text
  • 11. Cryptographic Methods One-Way Functions  One-way functions: Used to generate a fixed-length hash (also known as a message-digest) of a file. This hash is essentially a ‘digital fingerprint’ of the file that would be sent along with a document. The recipient would use the same method to generate a hash. If the hashes do not match the file has been altered. Message Crypto-Algorithm 5058f1af8388633f609cadb75a75dc9d 128 bit digital fingerprint
  • 12. Pretty Good Privacy  PGP or Pretty Good Privacy is as the name suggest a package that guarantees privacy or in other words it is an encryption package. PGP was developed by Phil Zimmermann.  PGP is a dual-key or public-key cryptosystem (also known as asymmetric cipher). One key is kept secret, the other key is made public. To communicate with the owner of the secret key a message is encrypted with the corresponding public key, this message can only be decrypted using the secret key.  When a user encrypts plaintext with PGP, PGP first compresses the plaintext  Data compression saves modem transmission time and disk space and, more importantly, strengthens cryptographic security.
  • 13. Cont’d……..  Compression reduces these patterns in the plaintext, thereby greatly enhancing resistance to cryptanalysis. (Files that are too short to compress or which don't compress well aren't compressed.)  PGP then creates a session key, which is a one-time-only secret key. This key is a random number generated from the random movements of your mouse and the keystrokes you type.  This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is cipher text.  Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the cipher text to the recipient.
  • 14.
  • 15. •Decryption works in the reverse. The recipient's copy of PGP uses his or her private key to recover the temporary session key, which PGP then uses to decrypt the conventionally-encrypted cipher text.
  • 16. Digital Signature  Digital Signature and Verification  Digital signature is a mechanism by which a message is authenticated i.e. proving that a  message is effectively coming from a given sender, much like a signature on a paper  document. For instance, suppose that Alice wants to digitally sign a message to Bob. To do  so, she uses her private-key to encrypt the message; she then sends the message along with  her public-key (typically, the public key is attached to the signed message). Since Alice’s  public-key is the only key that can decrypt that message, a successful decryption constitutes  a Digital Signature Verification, meaning that there is no doubt that it is Alice’s private key  that encrypted the message.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. THANK YOU SO MUCH