SlideShare a Scribd company logo
1 of 9
By Kajal Chaudhari
Roll No.: 30
Cryptography in networks.
• Cryptography derived its name from a Greek word
called “Kryptos” which means “Hidden Secrets”.
• Cryptography is a method of storing and transmitting
data in a particular form so that only those for whom it
is intended can read and process it.
• The term is most often associated with scrambling
plaintext (ordinary text) into cipher text (a process
called encryption), then back again (known as
decryption).
What is cryptography?
Bob Alice
Types of Cryptography
(Secret key) (Public key)
Asymmetric key cryptography: (Public key)
• Two different keys are used for encryption
and decryption.
• More secured, relatively complex
Symmetric key cryptography (private key)
• Only one key is used for encryption and decryption
• It is simple and faster
• Less secured
Purpose of cryptography
• Defending against external/internal
hackers
• Securing E-commerce
• Securing bank accounts/electronic
transfer
• Securing intellectual property
• Avoiding liability
Thank you!!

More Related Content

What's hot

Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSeokgu Yun
 
How your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain spaceHow your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain spaceMichał Załęcki
 
REST project brief - typical setup for teams
REST project brief - typical setup for teamsREST project brief - typical setup for teams
REST project brief - typical setup for teamsDian Swanepoel
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careJessica C. Gardner
 
Handshake with HTTPS
Handshake with HTTPSHandshake with HTTPS
Handshake with HTTPSRafiul Islam
 
Handshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul IslamHandshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul IslamCefalo
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhaniJack Mansukhani
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquespreetikapri1
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project reviewAmit Debnath
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography pptGowarthini
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 

What's hot (20)

DTU HTS 2017 - some take aways...
DTU HTS 2017 - some take aways...DTU HTS 2017 - some take aways...
DTU HTS 2017 - some take aways...
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Singapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet NetworkSingapore Korea IT Symposium 2018 - SovereignWallet Network
Singapore Korea IT Symposium 2018 - SovereignWallet Network
 
How your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain spaceHow your JavaScript skills apply in the blockchain space
How your JavaScript skills apply in the blockchain space
 
REST project brief - typical setup for teams
REST project brief - typical setup for teamsREST project brief - typical setup for teams
REST project brief - typical setup for teams
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should care
 
Handshake with HTTPS
Handshake with HTTPSHandshake with HTTPS
Handshake with HTTPS
 
Handshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul IslamHandshaking with HTTPS - Rafiul Islam
Handshaking with HTTPS - Rafiul Islam
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
HTTPS
HTTPSHTTPS
HTTPS
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Encryption
Encryption Encryption
Encryption
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project review
 
How encryption work
How encryption workHow encryption work
How encryption work
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 

Viewers also liked

Quý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tếtQuý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tếttosha456
 
Education and poverty in florida
Education and poverty in floridaEducation and poverty in florida
Education and poverty in floridaGiang Trinh
 
maglev train
maglev trainmaglev train
maglev train007skpk
 
hybrid electric vehicle
hybrid electric vehiclehybrid electric vehicle
hybrid electric vehicle007skpk
 
Data transmission rate and bandwidth
Data transmission rate and bandwidth Data transmission rate and bandwidth
Data transmission rate and bandwidth Kajal Chaudhari
 
A seminar report on maglev train
A seminar report on maglev trainA seminar report on maglev train
A seminar report on maglev train007skpk
 
Modern-Day Slavery
Modern-Day SlaveryModern-Day Slavery
Modern-Day SlaveryGiang Trinh
 
A seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicleA seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicle007skpk
 

Viewers also liked (10)

Quý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tếtQuý ông “treo máy” vì áp lực ngày tết
Quý ông “treo máy” vì áp lực ngày tết
 
Education and poverty in florida
Education and poverty in floridaEducation and poverty in florida
Education and poverty in florida
 
Apostila vba excel
Apostila vba excelApostila vba excel
Apostila vba excel
 
Apostila de economia_i
Apostila de economia_iApostila de economia_i
Apostila de economia_i
 
maglev train
maglev trainmaglev train
maglev train
 
hybrid electric vehicle
hybrid electric vehiclehybrid electric vehicle
hybrid electric vehicle
 
Data transmission rate and bandwidth
Data transmission rate and bandwidth Data transmission rate and bandwidth
Data transmission rate and bandwidth
 
A seminar report on maglev train
A seminar report on maglev trainA seminar report on maglev train
A seminar report on maglev train
 
Modern-Day Slavery
Modern-Day SlaveryModern-Day Slavery
Modern-Day Slavery
 
A seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicleA seminar report on hybrid electric vehicle
A seminar report on hybrid electric vehicle
 

Similar to Cryptography in networks

Similar to Cryptography in networks (20)

Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Ccn
CcnCcn
Ccn
 
Ccn
CcnCcn
Ccn
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

Cryptography in networks

  • 1. By Kajal Chaudhari Roll No.: 30 Cryptography in networks.
  • 2. • Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. • Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. • The term is most often associated with scrambling plaintext (ordinary text) into cipher text (a process called encryption), then back again (known as decryption). What is cryptography?
  • 4.
  • 5. Types of Cryptography (Secret key) (Public key)
  • 6. Asymmetric key cryptography: (Public key) • Two different keys are used for encryption and decryption. • More secured, relatively complex
  • 7. Symmetric key cryptography (private key) • Only one key is used for encryption and decryption • It is simple and faster • Less secured
  • 8. Purpose of cryptography • Defending against external/internal hackers • Securing E-commerce • Securing bank accounts/electronic transfer • Securing intellectual property • Avoiding liability