SOURASHTRA COLLEGE
CRYPTOGRAPHY
BY
L.S.KARNAN
II YEAR
B.Sc., Mathematics
 Cryptography is the Study of art and science of keeping
messages secure.
 Some other authors defined the cryptography as “Cryptography
is the process of writing using various methods (“ciphers”) to
keep messages secret”.
 Modern Cryptography combines the studies of Computer
Science and Mathematics for the purpose of Encoding
information to ensure that data is secure.
CRYPTOGRAPHY:
KEYWORDS:
• Cryptography
• Cryptanalysis
• Encryption
• Decryption
• Symmetric key
• Asymmetric key
• Algorithm
HISTORY OF CRYPTOGRAPHY:
Cryptography probably began in or around
2000 B.C. in Egypt.
There are three eras in the history of Cryptography:
▪ The Manual era
▪ The Mechanical era
▪ The Modern era
Manual era:
Manual era refers to pen and paper Cryptography and
dates back to 2000 B.C.
E.G. - Scytale, Caesar, Vigenere.
Mechanical era:
Mechanical era refers to the invention of cipher machines.
E.G. - Japanese Red and Purple Machines, German
Enigma.
Modern era:
The Modern era of cryptography refers to computers.
There are infinite permutations of cryptography available
using computers.
E.G. - Lucifer, RSA, ElGamal.
MODELS:
Ancient Cryptex Modern Cryptex
Sumerians
- Cuneiform writings Skytale
Encryption: c = Ee(p)
Decryption: p = Dd(c)
 Here p is a block of plaintext,
c is a block of ciphertext,
E is the encryption function,
e is the encryption key,
D is the decryption function and
d is the decryption key.
FORMULA:
MATHS
Encryption
NZGSH
Decryption
MATHS
Example:
Plain text
Cipher textPlain text
NZGSH
Cipher text
{
A B C D E……………Y Z
26 25 24 23 22…………... 2 1
1 2 3 4 5……………25 26 FORWARD NUMBER
FORWARD LETTER
BACKWARD NUMBER
M - 14 - N vice - versa
A - 26 - Z
T - 07 - G
H - 19 - S
S - 08 - H
For DecryptionFor Encryption
CODING METHOD :
F.LB.N
CATEGORIES OF CRYPTOGRAPHY:
CRYPTOGRAPHERS:
Caesar Leon Battista
Alberti
Blaise de Vigenere
CRYPTANALYSERS:
APPLICATIONS:
Privacy/confidentiality
Integrity
This method is followed in Military
This method is used in ATM centers
Now-a-days, internet is very insecure therefore
Cryptography method is followed to safeguard to
transmit data.
- Takes a long time to figure out the code
- It takes long to create the code
- If you were to send a code to another person in
the past, it will take long to get to that person
- OVERALL CRYPTOGRAPHY IT'S A
LONG PROCESS.
LIMITATIONS:
Cryptography

Cryptography

  • 1.
  • 2.
     Cryptography isthe Study of art and science of keeping messages secure.  Some other authors defined the cryptography as “Cryptography is the process of writing using various methods (“ciphers”) to keep messages secret”.  Modern Cryptography combines the studies of Computer Science and Mathematics for the purpose of Encoding information to ensure that data is secure. CRYPTOGRAPHY:
  • 3.
    KEYWORDS: • Cryptography • Cryptanalysis •Encryption • Decryption • Symmetric key • Asymmetric key • Algorithm
  • 5.
    HISTORY OF CRYPTOGRAPHY: Cryptographyprobably began in or around 2000 B.C. in Egypt. There are three eras in the history of Cryptography: ▪ The Manual era ▪ The Mechanical era ▪ The Modern era
  • 7.
    Manual era: Manual erarefers to pen and paper Cryptography and dates back to 2000 B.C. E.G. - Scytale, Caesar, Vigenere. Mechanical era: Mechanical era refers to the invention of cipher machines. E.G. - Japanese Red and Purple Machines, German Enigma. Modern era: The Modern era of cryptography refers to computers. There are infinite permutations of cryptography available using computers. E.G. - Lucifer, RSA, ElGamal.
  • 8.
    MODELS: Ancient Cryptex ModernCryptex Sumerians - Cuneiform writings Skytale
  • 11.
    Encryption: c =Ee(p) Decryption: p = Dd(c)  Here p is a block of plaintext, c is a block of ciphertext, E is the encryption function, e is the encryption key, D is the decryption function and d is the decryption key. FORMULA:
  • 12.
  • 13.
    { A B CD E……………Y Z 26 25 24 23 22…………... 2 1 1 2 3 4 5……………25 26 FORWARD NUMBER FORWARD LETTER BACKWARD NUMBER M - 14 - N vice - versa A - 26 - Z T - 07 - G H - 19 - S S - 08 - H For DecryptionFor Encryption CODING METHOD : F.LB.N
  • 14.
  • 17.
  • 18.
  • 19.
    APPLICATIONS: Privacy/confidentiality Integrity This method isfollowed in Military This method is used in ATM centers Now-a-days, internet is very insecure therefore Cryptography method is followed to safeguard to transmit data.
  • 20.
    - Takes along time to figure out the code - It takes long to create the code - If you were to send a code to another person in the past, it will take long to get to that person - OVERALL CRYPTOGRAPHY IT'S A LONG PROCESS. LIMITATIONS: