SlideShare a Scribd company logo
1 of 19
Cybersecurity Hands-on Workshop
2024
Cryptography is essential for cybersecurity, ensuring the
confidentiality, integrity, and authenticity of digital
data. It protects data from unauthorized access, verifies
identities in digital transactions, and ensures the
integrity of information through techniques like
encryption, digital signatures, and authentication
protocols.
Importance
Types of Cryptography:
•Symmetric Cryptography:
• Symmetric cryptography uses a single shared key for both
encryption and decryption.
• The sender encrypts the plaintext using the shared key to
produce ciphertext, and the recipient decrypts the ciphertext
using the same key to recover the plaintext.
•Asymmetric Cryptography:
• Asymmetric cryptography uses a pair of keys (public and
private) for encryption and decryption.
• The sender encrypts the plaintext using the recipient's public
key, and the recipient decrypts the ciphertext using their
private key.
•Secret cryptographic key
known only to its owner.
•Used for decryption and
digital signing.
•Must be kept confidential
and secure.
•Paired with private key in
asymmetric cryptography.
•Freely distributed to
others.
•Used for encryption and
verifying digital
signatures.
Hash Functions
Hash functions take an input (like a message or
data) and convert it into a fixed-size string of
characters.
Hash functions have two main properties: they
always produce the same output for the same
input (deterministic), and it's very hard to
generate the same output with different inputs
(collision resistance).
Common
Cryptographic
Algorithms
AES (Advanced Encryption Standard):
The Advanced Encryption Standard (AES)
is a symmetric key encryption algorithm
that uses the same key for encryption
and decryption.
AES is known for its strong security and
efficiency. It supports key sizes of 128,
192, or 256 bits
RSA (Rivest-Shamir-Adleman):
Rivest-Shamir-Adleman (RSA) is a public-key cryptographic
algorithm that protects sensitive data by encrypting and
decrypting it using a private and public key pair.
SHA (Secure Hash Algorithm):
SHA encryptions are used for a variety of methods including to hash
data, certificate files, and other cryptographic purposes including in
cryptocurrencies like bitcoin.
Cryptographic Protocols
SSL/TLS (Secure Sockets Layer/Transport Layer
Security):
• SSL/TLS protocols secure internet communication
by encrypting data, authenticating parties, and
ensuring data integrity.
• Web browsing, email, file transfer, remote access.
dCode
CyberChef
Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext.
Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext.

More Related Content

Similar to Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext.

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 

Similar to Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext. (20)

Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Network security
Network securityNetwork security
Network security
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Encryption
EncryptionEncryption
Encryption
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 

Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext.

  • 2.
  • 3.
  • 4. Cryptography is essential for cybersecurity, ensuring the confidentiality, integrity, and authenticity of digital data. It protects data from unauthorized access, verifies identities in digital transactions, and ensures the integrity of information through techniques like encryption, digital signatures, and authentication protocols. Importance
  • 5. Types of Cryptography: •Symmetric Cryptography: • Symmetric cryptography uses a single shared key for both encryption and decryption. • The sender encrypts the plaintext using the shared key to produce ciphertext, and the recipient decrypts the ciphertext using the same key to recover the plaintext. •Asymmetric Cryptography: • Asymmetric cryptography uses a pair of keys (public and private) for encryption and decryption. • The sender encrypts the plaintext using the recipient's public key, and the recipient decrypts the ciphertext using their private key.
  • 6.
  • 7. •Secret cryptographic key known only to its owner. •Used for decryption and digital signing. •Must be kept confidential and secure. •Paired with private key in asymmetric cryptography. •Freely distributed to others. •Used for encryption and verifying digital signatures.
  • 8. Hash Functions Hash functions take an input (like a message or data) and convert it into a fixed-size string of characters. Hash functions have two main properties: they always produce the same output for the same input (deterministic), and it's very hard to generate the same output with different inputs (collision resistance).
  • 10. AES (Advanced Encryption Standard): The Advanced Encryption Standard (AES) is a symmetric key encryption algorithm that uses the same key for encryption and decryption. AES is known for its strong security and efficiency. It supports key sizes of 128, 192, or 256 bits
  • 11. RSA (Rivest-Shamir-Adleman): Rivest-Shamir-Adleman (RSA) is a public-key cryptographic algorithm that protects sensitive data by encrypting and decrypting it using a private and public key pair.
  • 12.
  • 13.
  • 14. SHA (Secure Hash Algorithm): SHA encryptions are used for a variety of methods including to hash data, certificate files, and other cryptographic purposes including in cryptocurrencies like bitcoin.
  • 15. Cryptographic Protocols SSL/TLS (Secure Sockets Layer/Transport Layer Security): • SSL/TLS protocols secure internet communication by encrypting data, authenticating parties, and ensuring data integrity. • Web browsing, email, file transfer, remote access.
  • 16. dCode