SlideShare a Scribd company logo
By,
Name : Aiyesha.A
Roll No:02
IB - sem I
Discipline or techniques employed in
protecting integrity or secrecy of electronic
messages by converting them into
unreadable (cipher text ) form . Only the
use of a secret key can convert the cipher
text back to human readable (clear text)
form . Cryptography software and / or
hardware devices use mathematical
formulas (algorithms) to change text from
one form to another
Classical Cryptography:
 1900 BC – Tomb of Khnumhotep II in Egypt –
Unusual Hieroglyphs carved into the monuments.
 Arthshashtra by Kautalya – classic work on
statecraft – describes espionage service in India
by writing secret codes to the spies.
 100 BC – Julius Caesar – used encryption to
convey secret messages to his army generals in
war front – this substitution cipher is also known as
caesar cipher
 487 BC The ancient Greeks used the Scytale
transposition cipher – Spartan Military
Medieval Cryptography:
 800 AD – Al- Kindi – Arab Mathematician –
invented frequency- analysis technique used for
breaking monoalphabetic substitution ciphers . It
proved to be the fundamental cryptographic
advance until WWII
 1467 AD – Leon Battista Alberti – invented
Polyalphabetic cipher – “ Father of Western
Cryptology”
 French Cryptographer Blaise de Vigenere devised
practical polyalphabetic cipher which until today is
known as Vignere cipher
 1917 – Gilbert Vernman – Teleprinter Cipher –
led to development of electromechanical
devices as cipher machines.
 The Enigma Machine invented by German
Engineer Arthur Scherbius – an
electromechanical rotor machine was used
extensively by the Nazi Germans and The
Enigmas Cipher was cracked by
Mathematician Marian Rejewski from
Poland’s Cipher Bureau which proved to be
Ultra intelligence to the allied nations.
1990’s – Use of internet for commercial
purposes required widespread standard for
encryption.
Claude E.Shannon – considered to be the
father of mathematical cryptography.
Later by the influence of Shannon’s work –
M.E.Hellman and W.Diffie created public-
key cryptography
 Authentication / Digital Signatures :
Signatures are very important application of public – key
cryptography. The only requirement is that public keys are
associated with their users by a trusted manner, for example a
trusted directory. To address this weakness, the standards
community has invented an object called a certificate. A
certificate contains, the certificate issuer's name, the name of
the subject for whom the certificate is being issued, the public
key of the subject, and some time stamps. You know the
public key is good, because the certificate issuer has a
certificate too.
Pretty good Privacy(PGP) – Developed by Zimmerman –
provides encryption and authentication for e-mail and file
storage applications.
 Time Stamping :
Time stamping is a technique that can certify that a
certain electronic document or communication
existed or was delivered at a certain time. Time
stamping uses an encryption model called a blind
signature scheme. Blind signature schemes allow
the sender to get a message receipted by another
party without revealing any information about the
message to the other party.
Applications : Patent applications , copyright
archives and contracts.
Electronic Money :
The definition of electronic money (also
called electronic cash or digital cash) is a
term that is still evolving. It includes
transactions carried out electronically with
a net transfer of funds from one party to
another, which may be either debit or
credit and can be either anonymous or
identified.
Softwares used : DigiEcash and CyberCash
 Secure Network Communications :
Secure Socket Layer (SSL) – Provides data security
layered between applications protocols (such as HTTP
, Telnet , NNTP or FTP) . SSL supports data encryption
, server authentication , message integrity and client
authentication for TCP/IP connections.
 Kerberos –
Kerberos is an authentication service developed by
MIT which uses secret-key ciphers for encryption and
authentication. Kerberos was designed to authenticate
requests for network resources and does not
authenticate authorship of documents.
Anonymous Remailers –
A remailer is a free service that strips off the header information from
an electronic message and passes along only the content. It's
important to note that the remailer may retain your identity, and
rather than trusting the operator, many users may relay their
message through several anonymous remailers before sending it
to its intended recipient. That way only the first remailer has your
identity, and from the end point, it's nearly impossible to retrace.
Disk Encryption -
Disk encryption programs encrypt your
entire hard disk so that you don't have to
worry about leaving any traces of the
unencrypted data on your disk.
 The widespread availability of unbreakable encryption coupled with
anonymous services could lead to a situation where practically all
communications are immune from lawful interception (wiretaps) and
documents from lawful search and seizure, and where all electronic
transactions are beyond the reach of any government regulation or
oversight. The consequences of this to public safety and social and
economic stability could be devastating. With the government
essentially locked out, computers and telecommunications systems
would become safe havens for criminal activity.
 It is acknowledged that crypto anarchy provides a means for tax
evasion, money laundering, espionage (with digital dead drops),
contract killings, and implementation of data havens for storing and
marketing illegal or controversial material.
 Encryption also threatens national security by interfering with foreign
intelligence operations. The United States, along with many other
countries, imposes export controls on encryption technology to
lessen this threat.
 Cryptography poses a threat to organizations and
individuals too. With encryption, an employee of a
company can sell proprietary electronic information to
a competitor without the need to photocopy and handle
physical documents.
 Electronic information can be bought and sold on
"black networks" such as Black-Net [1] with complete
secrecy and anonymity -- a safe harbor for engaging in
both corporate and government espionage.
 The keys that unlock a corporation's files may be lost,
corrupted, or held hostage for ransom, thus rendering
valuable information inaccessible.
Cryptography

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
Cryptography ppt
Cryptography pptCryptography ppt
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Cryptography
Cryptography Cryptography
Cryptography
shubham Kumar
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Unit 1
Unit 1Unit 1
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Unit 1
Unit 1Unit 1
Unit 1
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Similar to Cryptography

Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
Ben Rothke
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
Muhammadalizardari
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
sunil sharma
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
DavidOfosuHamilton
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
Mocomi Kids
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
Gaurav Shukla
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
rosu555
 
Ao318992
Ao318992Ao318992
Ao318992IJMER
 
How encryption works
How encryption worksHow encryption works
How encryption worksMariko Saitoh
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
 

Similar to Cryptography (20)

Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Week12
Week12Week12
Week12
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Week12
Week12Week12
Week12
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Ao318992
Ao318992Ao318992
Ao318992
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 

More from Birmingham City University

Ports in india and its facilities
Ports in india and its facilitiesPorts in india and its facilities
Ports in india and its facilities
Birmingham City University
 
0 preservation of heritage and tribal culture
0 preservation of heritage and tribal culture0 preservation of heritage and tribal culture
0 preservation of heritage and tribal culture
Birmingham City University
 
United nations conference on trade and development
United nations conference on trade and developmentUnited nations conference on trade and development
United nations conference on trade and development
Birmingham City University
 
Logistic services marketing
Logistic services marketingLogistic services marketing
Logistic services marketing
Birmingham City University
 
Logistics in service industry final
Logistics in service industry final Logistics in service industry final
Logistics in service industry final
Birmingham City University
 
Porters Five Force Model on E-tailing and E-SCM
Porters Five Force Model on E-tailing and E-SCMPorters Five Force Model on E-tailing and E-SCM
Porters Five Force Model on E-tailing and E-SCM
Birmingham City University
 

More from Birmingham City University (6)

Ports in india and its facilities
Ports in india and its facilitiesPorts in india and its facilities
Ports in india and its facilities
 
0 preservation of heritage and tribal culture
0 preservation of heritage and tribal culture0 preservation of heritage and tribal culture
0 preservation of heritage and tribal culture
 
United nations conference on trade and development
United nations conference on trade and developmentUnited nations conference on trade and development
United nations conference on trade and development
 
Logistic services marketing
Logistic services marketingLogistic services marketing
Logistic services marketing
 
Logistics in service industry final
Logistics in service industry final Logistics in service industry final
Logistics in service industry final
 
Porters Five Force Model on E-tailing and E-SCM
Porters Five Force Model on E-tailing and E-SCMPorters Five Force Model on E-tailing and E-SCM
Porters Five Force Model on E-tailing and E-SCM
 

Recently uploaded

Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
AlejandraGmez176757
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
James Polillo
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
alex933524
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 

Recently uploaded (20)

Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 

Cryptography

  • 1. By, Name : Aiyesha.A Roll No:02 IB - sem I
  • 2. Discipline or techniques employed in protecting integrity or secrecy of electronic messages by converting them into unreadable (cipher text ) form . Only the use of a secret key can convert the cipher text back to human readable (clear text) form . Cryptography software and / or hardware devices use mathematical formulas (algorithms) to change text from one form to another
  • 3. Classical Cryptography:  1900 BC – Tomb of Khnumhotep II in Egypt – Unusual Hieroglyphs carved into the monuments.  Arthshashtra by Kautalya – classic work on statecraft – describes espionage service in India by writing secret codes to the spies.  100 BC – Julius Caesar – used encryption to convey secret messages to his army generals in war front – this substitution cipher is also known as caesar cipher  487 BC The ancient Greeks used the Scytale transposition cipher – Spartan Military
  • 4.
  • 5. Medieval Cryptography:  800 AD – Al- Kindi – Arab Mathematician – invented frequency- analysis technique used for breaking monoalphabetic substitution ciphers . It proved to be the fundamental cryptographic advance until WWII  1467 AD – Leon Battista Alberti – invented Polyalphabetic cipher – “ Father of Western Cryptology”  French Cryptographer Blaise de Vigenere devised practical polyalphabetic cipher which until today is known as Vignere cipher
  • 6.  1917 – Gilbert Vernman – Teleprinter Cipher – led to development of electromechanical devices as cipher machines.  The Enigma Machine invented by German Engineer Arthur Scherbius – an electromechanical rotor machine was used extensively by the Nazi Germans and The Enigmas Cipher was cracked by Mathematician Marian Rejewski from Poland’s Cipher Bureau which proved to be Ultra intelligence to the allied nations.
  • 7.
  • 8. 1990’s – Use of internet for commercial purposes required widespread standard for encryption. Claude E.Shannon – considered to be the father of mathematical cryptography. Later by the influence of Shannon’s work – M.E.Hellman and W.Diffie created public- key cryptography
  • 9.
  • 10.  Authentication / Digital Signatures : Signatures are very important application of public – key cryptography. The only requirement is that public keys are associated with their users by a trusted manner, for example a trusted directory. To address this weakness, the standards community has invented an object called a certificate. A certificate contains, the certificate issuer's name, the name of the subject for whom the certificate is being issued, the public key of the subject, and some time stamps. You know the public key is good, because the certificate issuer has a certificate too. Pretty good Privacy(PGP) – Developed by Zimmerman – provides encryption and authentication for e-mail and file storage applications.
  • 11.  Time Stamping : Time stamping is a technique that can certify that a certain electronic document or communication existed or was delivered at a certain time. Time stamping uses an encryption model called a blind signature scheme. Blind signature schemes allow the sender to get a message receipted by another party without revealing any information about the message to the other party. Applications : Patent applications , copyright archives and contracts.
  • 12. Electronic Money : The definition of electronic money (also called electronic cash or digital cash) is a term that is still evolving. It includes transactions carried out electronically with a net transfer of funds from one party to another, which may be either debit or credit and can be either anonymous or identified. Softwares used : DigiEcash and CyberCash
  • 13.  Secure Network Communications : Secure Socket Layer (SSL) – Provides data security layered between applications protocols (such as HTTP , Telnet , NNTP or FTP) . SSL supports data encryption , server authentication , message integrity and client authentication for TCP/IP connections.  Kerberos – Kerberos is an authentication service developed by MIT which uses secret-key ciphers for encryption and authentication. Kerberos was designed to authenticate requests for network resources and does not authenticate authorship of documents.
  • 14. Anonymous Remailers – A remailer is a free service that strips off the header information from an electronic message and passes along only the content. It's important to note that the remailer may retain your identity, and rather than trusting the operator, many users may relay their message through several anonymous remailers before sending it to its intended recipient. That way only the first remailer has your identity, and from the end point, it's nearly impossible to retrace.
  • 15. Disk Encryption - Disk encryption programs encrypt your entire hard disk so that you don't have to worry about leaving any traces of the unencrypted data on your disk.
  • 16.  The widespread availability of unbreakable encryption coupled with anonymous services could lead to a situation where practically all communications are immune from lawful interception (wiretaps) and documents from lawful search and seizure, and where all electronic transactions are beyond the reach of any government regulation or oversight. The consequences of this to public safety and social and economic stability could be devastating. With the government essentially locked out, computers and telecommunications systems would become safe havens for criminal activity.  It is acknowledged that crypto anarchy provides a means for tax evasion, money laundering, espionage (with digital dead drops), contract killings, and implementation of data havens for storing and marketing illegal or controversial material.  Encryption also threatens national security by interfering with foreign intelligence operations. The United States, along with many other countries, imposes export controls on encryption technology to lessen this threat.
  • 17.  Cryptography poses a threat to organizations and individuals too. With encryption, an employee of a company can sell proprietary electronic information to a competitor without the need to photocopy and handle physical documents.  Electronic information can be bought and sold on "black networks" such as Black-Net [1] with complete secrecy and anonymity -- a safe harbor for engaging in both corporate and government espionage.  The keys that unlock a corporation's files may be lost, corrupted, or held hostage for ransom, thus rendering valuable information inaccessible.