Cryptograph
y
Shubham
kumar
Contents
• What is cryptography?
• Encryption and
Decryption
• Types of Cryptography
• Conclusion
• Thank You
What is Cryptography ?
 Derived from a Greek word called “Kryptos”
which means “Hidden Secrets”.
 Practice and study of hiding information.
 Science of coding and decoding
Encryptio
n Converting plain text to
unintelligible
format(cipher text).
Decryptio
n The process of converting
cipher text into a plain text is
called Decryption.
 It is reverse of encryption.
Types of Cryptography
• Similar key for
encryption and
decryption.
• e.g. ceaser cipher,
vigenere cipher
Symmetric
key
cryptography
• Different key for
encryption and
decryption.
• e.g. RSA
Asymmetric
key
cryptography
Conclusion
 Improves security of internet.
 Keeps privacy secure
 It hides the message and your privacy is
safe
 No one would be able to know what it
says unless there's a key to the code
 Takes a long time to figure out the code
 It takes long to create the code
 OVERALL CRYPTOGRAPHY IT'S A LONG
PROCESS
For every lock there is a key…
It is better to safe your lock
than the key

Cryptography

  • 1.
  • 2.
    Contents • What iscryptography? • Encryption and Decryption • Types of Cryptography • Conclusion • Thank You
  • 3.
    What is Cryptography?  Derived from a Greek word called “Kryptos” which means “Hidden Secrets”.  Practice and study of hiding information.  Science of coding and decoding
  • 4.
    Encryptio n Converting plaintext to unintelligible format(cipher text). Decryptio n The process of converting cipher text into a plain text is called Decryption.  It is reverse of encryption.
  • 5.
    Types of Cryptography •Similar key for encryption and decryption. • e.g. ceaser cipher, vigenere cipher Symmetric key cryptography • Different key for encryption and decryption. • e.g. RSA Asymmetric key cryptography
  • 6.
    Conclusion  Improves securityof internet.  Keeps privacy secure  It hides the message and your privacy is safe  No one would be able to know what it says unless there's a key to the code  Takes a long time to figure out the code  It takes long to create the code  OVERALL CRYPTOGRAPHY IT'S A LONG PROCESS
  • 7.
    For every lockthere is a key… It is better to safe your lock than the key

Editor's Notes

  • #4 Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy
  • #6  Ron Rivest, Adi Shamir and Leonard Adleman