SlideShare a Scribd company logo
SOURASHTRA COLLEGE
CRYPTOGRAPHY
BY
L.S.KARNAN
II YEAR
B.Sc., Mathematics
 Cryptography is the Study of art and science of keeping
messages secure.
 Some other authors defined the cryptography as “Cryptography
is the process of writing using various methods (“ciphers”) to
keep messages secret”.
 Modern Cryptography combines the studies of Computer
Science and Mathematics for the purpose of Encoding
information to ensure that data is secure.
CRYPTOGRAPHY:
KEYWORDS:
• Cryptography
• Cryptanalysis
• Encryption
• Decryption
• Symmetric key
• Asymmetric key
• Algorithm
HISTORY OF CRYPTOGRAPHY:
Cryptography probably began in or around
2000 B.C. in Egypt.
There are three eras in the history of Cryptography:
▪ The Manual era
▪ The Mechanical era
▪ The Modern era
Manual era:
Manual era refers to pen and paper Cryptography and
dates back to 2000 B.C.
E.G. - Scytale, Caesar, Vigenere.
Mechanical era:
Mechanical era refers to the invention of cipher machines.
E.G. - Japanese Red and Purple Machines, German
Enigma.
Modern era:
The Modern era of cryptography refers to computers.
There are infinite permutations of cryptography available
using computers.
E.G. - Lucifer, RSA, ElGamal.
MODELS:
Ancient Cryptex Modern Cryptex
Sumerians
- Cuneiform writings Skytale
Encryption: c = Ee(p)
Decryption: p = Dd(c)
 Here p is a block of plaintext,
c is a block of ciphertext,
E is the encryption function,
e is the encryption key,
D is the decryption function and
d is the decryption key.
FORMULA:
MATHS
Encryption
NZGSH
Decryption
MATHS
Example:
Plain text
Cipher textPlain text
NZGSH
Cipher text
{
A B C D E……………Y Z
26 25 24 23 22…………... 2 1
1 2 3 4 5……………25 26 FORWARD NUMBER
FORWARD LETTER
BACKWARD NUMBER
M - 14 - N vice - versa
A - 26 - Z
T - 07 - G
H - 19 - S
S - 08 - H
For DecryptionFor Encryption
CODING METHOD :
F.LB.N
CATEGORIES OF CRYPTOGRAPHY:
CRYPTOGRAPHERS:
Caesar Leon Battista
Alberti
Blaise de Vigenere
CRYPTANALYSERS:
APPLICATIONS:
Privacy/confidentiality
Integrity
This method is followed in Military
This method is used in ATM centers
Now-a-days, internet is very insecure therefore
Cryptography method is followed to safeguard to
transmit data.
- Takes a long time to figure out the code
- It takes long to create the code
- If you were to send a code to another person in
the past, it will take long to get to that person
- OVERALL CRYPTOGRAPHY IT'S A
LONG PROCESS.
LIMITATIONS:
Cryptography

More Related Content

What's hot

History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
Farah Shaikh
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
Abhishek Gautam
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
Christopher Martin
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Ramadhi Irawan
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Cryptography
CryptographyCryptography
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 

What's hot (20)

History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 

Viewers also liked

Rationale behind
Rationale behindRationale behind
Rationale behind
Little ッ
 
Question 1
Question 1Question 1
Question 1
Anya Wagstaff
 
喜多福香蒜油
喜多福香蒜油喜多福香蒜油
喜多福香蒜油
彥欣 李
 
Storyboard of opening sequence
Storyboard of opening sequenceStoryboard of opening sequence
Storyboard of opening sequence
tomanton
 
Fabula's Catalogue_2014
Fabula's Catalogue_2014Fabula's Catalogue_2014
Fabula's Catalogue_2014
NishthasShed
 
60-70-80-90's
60-70-80-90's60-70-80-90's
60-70-80-90's
Ozan Çepni
 
Como elaborar un texto
Como elaborar un textoComo elaborar un texto
Como elaborar un texto
laconcogrelos
 
The Fastest Storage solution, HFT report
The Fastest Storage solution, HFT reportThe Fastest Storage solution, HFT report
The Fastest Storage solution, HFT report
Simon Hsu
 
Qaulan syadida
Qaulan syadidaQaulan syadida
Qaulan syadida
panglimaagus
 
Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014
Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014
Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014
Ted Stenger
 
Batikiotis_diagrafh dhmosiou_xreous
Batikiotis_diagrafh dhmosiou_xreousBatikiotis_diagrafh dhmosiou_xreous
Batikiotis_diagrafh dhmosiou_xreous
allagiporeias
 
IVT Företagspresentation
IVT FöretagspresentationIVT Företagspresentation
IVT Företagspresentation
Energiteknik i Teckomatorp
 
Session ii(html)
Session ii(html)Session ii(html)
Session ii(html)
Shrijan Tiwari
 
20141213 speech bib_heusden_zolder
20141213 speech bib_heusden_zolder20141213 speech bib_heusden_zolder
20141213 speech bib_heusden_zolder
Bart Beuten
 
Oppimisaihioista opetusresursseihin
Oppimisaihioista opetusresursseihinOppimisaihioista opetusresursseihin
Oppimisaihioista opetusresursseihin
Teija Lehto
 

Viewers also liked (16)

Rationale behind
Rationale behindRationale behind
Rationale behind
 
Question 1
Question 1Question 1
Question 1
 
喜多福香蒜油
喜多福香蒜油喜多福香蒜油
喜多福香蒜油
 
Storyboard of opening sequence
Storyboard of opening sequenceStoryboard of opening sequence
Storyboard of opening sequence
 
Fabula's Catalogue_2014
Fabula's Catalogue_2014Fabula's Catalogue_2014
Fabula's Catalogue_2014
 
60-70-80-90's
60-70-80-90's60-70-80-90's
60-70-80-90's
 
Como elaborar un texto
Como elaborar un textoComo elaborar un texto
Como elaborar un texto
 
OfficeAutomat_01_11_14
OfficeAutomat_01_11_14OfficeAutomat_01_11_14
OfficeAutomat_01_11_14
 
The Fastest Storage solution, HFT report
The Fastest Storage solution, HFT reportThe Fastest Storage solution, HFT report
The Fastest Storage solution, HFT report
 
Qaulan syadida
Qaulan syadidaQaulan syadida
Qaulan syadida
 
Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014
Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014
Bankruptcy Trends in Retail - TMA Retail Webinar Nov 2014
 
Batikiotis_diagrafh dhmosiou_xreous
Batikiotis_diagrafh dhmosiou_xreousBatikiotis_diagrafh dhmosiou_xreous
Batikiotis_diagrafh dhmosiou_xreous
 
IVT Företagspresentation
IVT FöretagspresentationIVT Företagspresentation
IVT Företagspresentation
 
Session ii(html)
Session ii(html)Session ii(html)
Session ii(html)
 
20141213 speech bib_heusden_zolder
20141213 speech bib_heusden_zolder20141213 speech bib_heusden_zolder
20141213 speech bib_heusden_zolder
 
Oppimisaihioista opetusresursseihin
Oppimisaihioista opetusresursseihinOppimisaihioista opetusresursseihin
Oppimisaihioista opetusresursseihin
 

Similar to Cryptography

Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9
Shan Raja
 
Cryptography
CryptographyCryptography
Cryptography
nayakslideshare
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
Abhishek Nand
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
Aadya Vatsa
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
Manojit Ballav
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
Faraz Qureshi
 
Cryptography
CryptographyCryptography
Cryptography
Kural Amudhan
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
AschalewAyele2
 
Computer network
Computer networkComputer network
Computer network
snegacmr
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Cryptography
CryptographyCryptography
Cryptography
Hira Khan
 
CRYPTOLOGY
CRYPTOLOGYCRYPTOLOGY
CRYPTOLOGY
KARNAN L S
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
Yekini Nureni
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
Johnree4
 
Cryptologypastpresentandfuture 130131082256-phpapp02
Cryptologypastpresentandfuture 130131082256-phpapp02Cryptologypastpresentandfuture 130131082256-phpapp02
Cryptologypastpresentandfuture 130131082256-phpapp02
KARNAN L S
 
Ppt ns
Ppt nsPpt ns
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
My cryptography
My cryptographyMy cryptography
My cryptography
NAVYA RAO
 

Similar to Cryptography (20)

Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9Encryptolog y-1216310707267721-9
Encryptolog y-1216310707267721-9
 
Cryptography
CryptographyCryptography
Cryptography
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
 
Computer network
Computer networkComputer network
Computer network
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Cryptography
CryptographyCryptography
Cryptography
 
CRYPTOLOGY
CRYPTOLOGYCRYPTOLOGY
CRYPTOLOGY
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
 
Cryptologypastpresentandfuture 130131082256-phpapp02
Cryptologypastpresentandfuture 130131082256-phpapp02Cryptologypastpresentandfuture 130131082256-phpapp02
Cryptologypastpresentandfuture 130131082256-phpapp02
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
My cryptography
My cryptographyMy cryptography
My cryptography
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 

Cryptography

  • 2.  Cryptography is the Study of art and science of keeping messages secure.  Some other authors defined the cryptography as “Cryptography is the process of writing using various methods (“ciphers”) to keep messages secret”.  Modern Cryptography combines the studies of Computer Science and Mathematics for the purpose of Encoding information to ensure that data is secure. CRYPTOGRAPHY:
  • 3. KEYWORDS: • Cryptography • Cryptanalysis • Encryption • Decryption • Symmetric key • Asymmetric key • Algorithm
  • 4.
  • 5. HISTORY OF CRYPTOGRAPHY: Cryptography probably began in or around 2000 B.C. in Egypt. There are three eras in the history of Cryptography: ▪ The Manual era ▪ The Mechanical era ▪ The Modern era
  • 6.
  • 7. Manual era: Manual era refers to pen and paper Cryptography and dates back to 2000 B.C. E.G. - Scytale, Caesar, Vigenere. Mechanical era: Mechanical era refers to the invention of cipher machines. E.G. - Japanese Red and Purple Machines, German Enigma. Modern era: The Modern era of cryptography refers to computers. There are infinite permutations of cryptography available using computers. E.G. - Lucifer, RSA, ElGamal.
  • 8. MODELS: Ancient Cryptex Modern Cryptex Sumerians - Cuneiform writings Skytale
  • 9.
  • 10.
  • 11. Encryption: c = Ee(p) Decryption: p = Dd(c)  Here p is a block of plaintext, c is a block of ciphertext, E is the encryption function, e is the encryption key, D is the decryption function and d is the decryption key. FORMULA:
  • 13. { A B C D E……………Y Z 26 25 24 23 22…………... 2 1 1 2 3 4 5……………25 26 FORWARD NUMBER FORWARD LETTER BACKWARD NUMBER M - 14 - N vice - versa A - 26 - Z T - 07 - G H - 19 - S S - 08 - H For DecryptionFor Encryption CODING METHOD : F.LB.N
  • 15.
  • 16.
  • 19. APPLICATIONS: Privacy/confidentiality Integrity This method is followed in Military This method is used in ATM centers Now-a-days, internet is very insecure therefore Cryptography method is followed to safeguard to transmit data.
  • 20. - Takes a long time to figure out the code - It takes long to create the code - If you were to send a code to another person in the past, it will take long to get to that person - OVERALL CRYPTOGRAPHY IT'S A LONG PROCESS. LIMITATIONS: