SlideShare a Scribd company logo
Cryptography –
Encryption/Decryption
What is Cryptography?
      Cryptography derived its name from a
      Greek word called “Kryptos” which
      means “Hidden Secrets”.

      Cryptography is the practice and study
      of hiding information. It is the Art or
      Science of converting a plain
      intelligible data into an unintelligible
      data and again retransforming that
      message into its original form.

      It provides
      Confidentiality, Integrity, Accuracy.
What is Encryption / Decryption

   Encryption –
    ◦ The process of converting plain text into an
      unintelligible format (cipher text) is called
      Encryption.


   Decryption –
    ◦ The process of converting cipher text into a plain
      text is called Decryption.
What are the Types of Cryptography
   Symmetric Key Cryptography (Secret Key Cryptography)
    ◦ Same Key is used by both parties
    Advantages
     1. Simpler and Faster

    Disadvantages
    1. Less Secured




Image taken from :-
www.google.com
   Asymmetric Key Cryptography (Public Key Cryptography)
    ◦ 2 different keys are used
    ◦ Users get the Key from an Certificate Authority

    Advantages
    1. More Secured
    2. Authentication

    Disadvantages
    1. Relatively Complex




Image taken from :-
www.google.com
   What is a Key
    ◦ In cryptography, a key is a variable value that is applied
      using an algorithm to a string or block of unencrypted text
      to produce encrypted text, or to decrypt encrypted text.
      The length of the key is a factor in considering how
      difficult it will be to decrypt the text in a given message.

   What is a Block Cipher?
    ◦ A method of encrypting / decrypting data
    ◦ Key is used for encryption / decryption.
    ◦ Same size of I/P and O/P

   What is Initialization Vector?
    ◦ An initialization vector (IV) is an arbitrary number that can
      be used along with a secret key for data encryption.
    ◦ It is a group of hex values.
   What is DES?
    ◦ The Data Encryption Standard (DES) is a previously predominant
      algorithm used for encryption/decryption of electronic data. DES
      was developed in the early 70’s by IBM which was then submitted
      to the National Bureau of Standards (NBS).

    ◦ Like other private key cryptographic methods, both the sender
      and the receiver must know and use the same private key.

    ◦ DES uses a 56 bit encryption key which can give around 2^56 (ie)
      256 combinations to encrypt the plain text. DES is restricted with
      a Block Size of just 64bits.

    ◦ Sometimes DES is said to use 64 bit key, but 8bits out of it is
      used for some other purpose.

    ◦ The maximum amount that can be transferred with a single
      encryption is 32GB. DES uses the Feistel Network which divides
      block into 2 halves before going through the encryption steps.
   What is AES?
    ◦ The Advanced Encryption Standard (AES) is a specification for
      the Encryption of electronic data. Originally called “Rijndael” the
      cipher was developed by 2 Belgian Cryptographers “Joan
      Daemen” and “Vincent Rijmen” who submitted to the AES
      Selection process held by the NIST (National Institute of
      Standards and Technology) in the year 1997 which continued for
      3 years and the end result was given on 2nd October 2002 where
      Rijndael was chosen as the proposed standard.

    ◦ The algorithm described by AES is a Symmetric-Key
      Algorithm, meaning the same key is used for encrypting and
      decrypting the data. AES standard is a variant of Rijndael where
      the block size is restricted to 128bits and the key size of
      128, 192, 256 bits can be used.

    ◦ AES is based on a design principle known as a substitution-
      permutation network, and is fast in both software and hardware.
DES Encryption                                      AES Encryption
DES uses only 56 bits key which provides a         AES can use 128, 192, 256 bits keys which
combination of 2^56 = 256 combinations for         provides 2^128, 2^192, 2^256 combinations for
encryption.                                        encryption.
DES is restricted to use a Block Size of only 64   AES is restricted to use a Block Size of 128 bits
bits                                               (double of what is used in DES)
With 64 bits block size, the amount of data that   With AES, it is possible to transfer around 256
can be transferred with a single encryption key    billion GB of data. It is probably safe to say that
is just 32GB.                                      you can use a single AES encryption key for
                                                   any application.
DES uses a Feistel network, which divides the      AES uses Permutation-Substitution method,
block into 2 halves before going through the       which involves a series of substitution and
Encryption steps.                                  permutation steps to create the encrypted
                                                   block.
DES encryption is breakable through Brute          AES encryption on the other hand is still not
Force attack.                                      breakable, though there are some theoretical
                                                   discussions about breaking the AES.
DES is an old technique used for                   AES is relatively new.
encryption/decryption
Time required to check all the possible keys at    Time required to check all the possible keys at
50 billion keys per second – For a 128-bit key:    50 billion keys per second – For a 56-bit key:
5x1021 years (which makes it difficult for the     400 days.
hackers to decrypt the data)
THANK YOU

More Related Content

What's hot

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
jolly9293
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Cryptography
CryptographyCryptography
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Key management
Key managementKey management
Key management
Sujata Regoti
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
Anamika Singh
 

What's hot (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cryptography
CryptographyCryptography
Cryptography
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cryptography
CryptographyCryptography
Cryptography
 
Kerberos
KerberosKerberos
Kerberos
 
Key management
Key managementKey management
Key management
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 

Viewers also liked

Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
Roman Oliynykov
 
E - governance
E - governanceE - governance
E - governance
Nishant Pahad
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
E governance
E governanceE governance
E governance
Payel Ghosh
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governanceShelly
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
Fei Yue Paper Industrial Co.,Ltd.
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sukhvir Sabharwal
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
Agniv Mukherjee
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
Tim O'Reilly
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
Anurag Chaudhary
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
Snehil Rastogi
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design TrainingESCOM
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
Orange Slides
 

Viewers also liked (20)

cryptography
cryptographycryptography
cryptography
 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
 
E - governance
E - governanceE - governance
E - governance
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
E governance
E governanceE governance
E governance
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
types of network
types of networktypes of network
types of network
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
 
Cryptography
CryptographyCryptography
Cryptography
 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
 

Similar to Cryptography

Cryptography
CryptographyCryptography
Cryptography
Shankar Ghorpade
 
Cryptography
Cryptography Cryptography
Cryptography
Shankar Ghorpade
 
Encryption
EncryptionEncryption
Encryption
IGZ Software house
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing1
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Dharani675311
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
SathrukaSinha
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Encryption
EncryptionEncryption
Encryption
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Cryptography

  • 2.
  • 3. What is Cryptography? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 4. What is Encryption / Decryption  Encryption – ◦ The process of converting plain text into an unintelligible format (cipher text) is called Encryption.  Decryption – ◦ The process of converting cipher text into a plain text is called Decryption.
  • 5. What are the Types of Cryptography  Symmetric Key Cryptography (Secret Key Cryptography) ◦ Same Key is used by both parties Advantages 1. Simpler and Faster Disadvantages 1. Less Secured Image taken from :- www.google.com
  • 6. Asymmetric Key Cryptography (Public Key Cryptography) ◦ 2 different keys are used ◦ Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex Image taken from :- www.google.com
  • 7. What is a Key ◦ In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the text in a given message.  What is a Block Cipher? ◦ A method of encrypting / decrypting data ◦ Key is used for encryption / decryption. ◦ Same size of I/P and O/P  What is Initialization Vector? ◦ An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption. ◦ It is a group of hex values.
  • 8. What is DES? ◦ The Data Encryption Standard (DES) is a previously predominant algorithm used for encryption/decryption of electronic data. DES was developed in the early 70’s by IBM which was then submitted to the National Bureau of Standards (NBS). ◦ Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key. ◦ DES uses a 56 bit encryption key which can give around 2^56 (ie) 256 combinations to encrypt the plain text. DES is restricted with a Block Size of just 64bits. ◦ Sometimes DES is said to use 64 bit key, but 8bits out of it is used for some other purpose. ◦ The maximum amount that can be transferred with a single encryption is 32GB. DES uses the Feistel Network which divides block into 2 halves before going through the encryption steps.
  • 9. What is AES? ◦ The Advanced Encryption Standard (AES) is a specification for the Encryption of electronic data. Originally called “Rijndael” the cipher was developed by 2 Belgian Cryptographers “Joan Daemen” and “Vincent Rijmen” who submitted to the AES Selection process held by the NIST (National Institute of Standards and Technology) in the year 1997 which continued for 3 years and the end result was given on 2nd October 2002 where Rijndael was chosen as the proposed standard. ◦ The algorithm described by AES is a Symmetric-Key Algorithm, meaning the same key is used for encrypting and decrypting the data. AES standard is a variant of Rijndael where the block size is restricted to 128bits and the key size of 128, 192, 256 bits can be used. ◦ AES is based on a design principle known as a substitution- permutation network, and is fast in both software and hardware.
  • 10. DES Encryption AES Encryption DES uses only 56 bits key which provides a AES can use 128, 192, 256 bits keys which combination of 2^56 = 256 combinations for provides 2^128, 2^192, 2^256 combinations for encryption. encryption. DES is restricted to use a Block Size of only 64 AES is restricted to use a Block Size of 128 bits bits (double of what is used in DES) With 64 bits block size, the amount of data that With AES, it is possible to transfer around 256 can be transferred with a single encryption key billion GB of data. It is probably safe to say that is just 32GB. you can use a single AES encryption key for any application. DES uses a Feistel network, which divides the AES uses Permutation-Substitution method, block into 2 halves before going through the which involves a series of substitution and Encryption steps. permutation steps to create the encrypted block. DES encryption is breakable through Brute AES encryption on the other hand is still not Force attack. breakable, though there are some theoretical discussions about breaking the AES. DES is an old technique used for AES is relatively new. encryption/decryption Time required to check all the possible keys at Time required to check all the possible keys at 50 billion keys per second – For a 128-bit key: 50 billion keys per second – For a 56-bit key: 5x1021 years (which makes it difficult for the 400 days. hackers to decrypt the data)