SlideShare a Scribd company logo
CRYPTOGRAPHY
COURSE: CIS2222
SCHOOL: T.C.I. COMM.
COLLEGEDATE: MAY 11,
2015
PRESENTER:
DONTE FRANCIS
1
WHAT IS CRYPTOGRAPHY?
BRIEF HISTORY OF CRYPTOGRAPHY
WHERE IS CRYPTOGRAPHY USED TODAY?
SYNOPSIS:
IMPORTANCE OF CRYPTOGRAPHY
IS CRYPTOGRAPHY SAFE?
CONCLUSION
RESTRICTIONS OF CRYPTOGRAPHY
2
WHAT IS CRYPTOGRAPHY?
Cryptography is the process of encrypting and
decrypting messages to and from the sender
and receiver to maintain integrity, secrecy
and/or protection of confidential information.
3
WHAT IS CRYPTOGRAPHY?
Terminologies:
Encryption: The process of converting plaintext to cipher
text.
Decryption: The process of converting cipher text to
plaintext.
4
Plaintext: Data that has not been converted; original text.
Cipher text: Data that has been converted.
Earliest known use of cryptography was
in Egypt (ca 1900 BCE) carved
into a stone.
BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784
5
Hebrew masters and scholars
were the first to use simple
cipher based on substitution.
BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784
A = Z, B = Y, C = X, etc.
Hebrew ciphers
6
5th century BC Spartan
introduced the first military
strategist’s cryptography.
BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784
Scytale
7
One of history’s most
famous ciphers
called Ceasar cipher (named
after Julius Cipher)
BRIEF HISTORY OF CRYPTOGRAPHY:
http://www.posterus.sk/?p=13784
Caesar Cipher
8
The modern field of cryptography is computerised and can
be divided into two kinds,
symmetric-key
and
asymmetric-key cryptography.
WHERE IS CRYPTOGRAPHY USED TODAY?
9
symmetric-key cryptography: encryption method in which both the
sender and receiver share the same
key (a unique way of decrypting
messages).
asymmetric-key cryptography: encryption method of using two
keys; a public and a private key.
key: a secret or public way of encrypting and/or decrypting cipher
text.
WHERE IS CRYPTOGRAPHY USED TODAY?
Terminologies
10
WHERE IS CRYPTOGRAPHY USED TODAY?
Symmetric-key Cryptography
11
WHERE IS CRYPTOGRAPHY USED TODAY?
Symmetric-key Cryptography
Caesar Cipher
Circle
12
WHERE IS CRYPTOGRAPHY USED TODAY?
Symmetric-key Cryptography
13
WHERE IS CRYPTOGRAPHY USED TODAY?
Asymmetric-key Cryptography
14
WHERE IS CRYPTOGRAPHY USED TODAY?
Asymmetric-key Cryptography
15
WHERE IS CRYPTOGRAPHY USED TODAY?
Device Password
Alarm Systems ATMS & CREDIT CARDS
ATMS & CREDIT CARDSONLINE USE
16
In some countries, even the domestic use of cryptography
is, or has been, restricted.
RESTRICTIONS OF CRYPTOGRAPHY
According to Crypto Law Survey (2013), “In China and Iran,
a license is still required to use cryptography.”
17
Many countries have tight restrictions on the use of
cryptography. Among the more restrictive are laws in
Belarus, Kazakhstan, Mongolia, Pakistan, Singapore,
Tunisia, and Vietnam.
Link: (http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/cryptographic-policies-countries.htm)
RESTRICTIONS OF CRYPTOGRAPHY
18
In the United States, cryptography is legal for domestic use,
but there has been much conflict over legal issues related to
cryptography.
RESTRICTIONS OF CRYPTOGRAPHY
19
Did you know?
After World War II, it was illegal in the US to sell or distribute
encryption technology overseas (Rosenoer, 1995).
In the United Kingdom, the Regulation of Investigatory
Powers Act gives UK police the powers to force suspects to
decrypt files or hand over passwords that protect encryption
keys. Failure to comply is an offence in its own right,
punishable on conviction by a two-year jail sentence or up to
five years in cases involving national security.
Link: (http://www.pcworld.com/article/137881/uk_data_encryption_disclosure_law_takes_effect.html)
RESTRICTIONS OF CRYPTOGRAPHY
20
Adobe, lost all due to everything being accessed by hackers
(a group of people that seeks and exploits weaknesses in a
computer system or computer network).
October 2013;
• Customer Identities;
• Customer Passwords;
• All belonging to over 3 Million Adobe Customers.
Scenario:
21
Cryptanalysis:
• Definition: The study of analysing information
systems in order to study the hidden aspects of the
systems
• Espionage
• Bribery
• Burglary
• Defection
22
Cryptanalysis:
• Governments have long recognised the potential benefits
of cryptanalysis for intelligence, both military and
diplomatic, and established dedicated organisations
devoted to breaking the codes and ciphers of other nations.
"Breaking codes: An impossible task?". BBC News. June 21, 2004.
23
Adobe, lost all due to everything being accessed by hackers
(a group of people that seeks and exploits weaknesses in a
computer system or computer network).
IS CRYPTOGRAPHY SAFE?
October 2013;
• Customer Identities;
• Customer Passwords;
• All belonging to over 3 Million Adobe Customers.
Scenario:
24
IS CRYPTOGRAPHY SAFE?
October 2013;
• Customer Identities;
• Customer Passwords;
• All belonging to over 3 Million Adobe Customers.
Scenario:
There is a diamond of good news in their
announcement. They had encrypted their data.
GOOD NEWS!
ENCRYPTED!
ENCRYPTED!
25
CRYPTOGRAPHY BENEFITS:
• The tools of encryption and key management can (and
should, especially after this scenario) be applied at
numerous layers of business to protect, isolate, and
control data.
• Adobe did not lose anything!
IMPORTANCE OF CRYPTOGRAPHY
26
CONCLUSION
27
CONCLUSION
In conclusion, we can therefore agree that cryptography is
not alone the process of encrypting and decrypting
confidential information; it is the evolutionary need for life.
It is easy to deploy and use and provides a strong
protection against data thieves.
28
29
THANK YOU

More Related Content

What's hot

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Cryptography
CryptographyCryptography
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cryptography
CryptographyCryptography
Cryptography
research30
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Encryption
Encryption Encryption
Encryption
Adnan Malak
 
Cryptography ppt
Cryptography pptCryptography ppt
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
quantum cryptography
quantum cryptographyquantum cryptography
Cryptography
CryptographyCryptography
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 

What's hot (20)

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography
CryptographyCryptography
Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption
Encryption Encryption
Encryption
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 

Viewers also liked

Cryptography
CryptographyCryptography
Cryptography
Tushar Swami
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Cryptography
Cryptography Cryptography
Cryptography
shubham Kumar
 
Cryptography
CryptographyCryptography
Cryptography
milanmath
 
Cryptography
CryptographyCryptography
Cryptography
vidhiyarahul
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mir
AFROZ MIR
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Cryptography
CryptographyCryptography
Cryptography
ankit dubey
 
Cryptography
CryptographyCryptography
Cryptography
Kural Amudhan
 
11848 ch04(1) (1)
11848 ch04(1) (1)11848 ch04(1) (1)
11848 ch04(1) (1)
Debanjan Bhattacharya
 
EDUCATION ON CRYPTOGRAPHY
EDUCATION ON CRYPTOGRAPHYEDUCATION ON CRYPTOGRAPHY
EDUCATION ON CRYPTOGRAPHY
globalbtcrating
 
Cryptography
CryptographyCryptography
Cryptography
Deepak Kumar
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
infosecedu
 

Viewers also liked (15)

Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mir
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
11848 ch04(1) (1)
11848 ch04(1) (1)11848 ch04(1) (1)
11848 ch04(1) (1)
 
EDUCATION ON CRYPTOGRAPHY
EDUCATION ON CRYPTOGRAPHYEDUCATION ON CRYPTOGRAPHY
EDUCATION ON CRYPTOGRAPHY
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
 

Similar to Cryptography Presentation

Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
Vaibhav Khanna
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
SudhanshuKarna
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
SudhanshuKarna
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
Jayna Mistry
 
Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021
Oluwaseyi Adeniyan
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
ijtsrd
 
cryptography
cryptographycryptography
cryptography
Balaji Ravi
 
Crytography
CrytographyCrytography
Crytography
Anchal Kumar
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
Mocomi Kids
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
Carla Bennington
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022
Temok IT Services
 
Cryptography
Cryptography Cryptography
Cryptography
1326OmkarKamble
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
shoploala
 
Securing the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber CryptoSecuring the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber Crypto
cybertracking342
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
jemtallon
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
GarimaJain745610
 
APPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYAPPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHY
Home
 
Backdoor Dreaming
Backdoor DreamingBackdoor Dreaming
Backdoor Dreaming
Carola Frediani
 

Similar to Cryptography Presentation (20)

Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
cryptography
cryptographycryptography
cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022
 
Cryptography
Cryptography Cryptography
Cryptography
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
 
Securing the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber CryptoSecuring the Digital Frontier: Navigating the World of Cyber Crypto
Securing the Digital Frontier: Navigating the World of Cyber Crypto
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
APPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHYAPPLICATION OF GROUPS IN CRYPTOGRAPHY
APPLICATION OF GROUPS IN CRYPTOGRAPHY
 
Backdoor Dreaming
Backdoor DreamingBackdoor Dreaming
Backdoor Dreaming
 

Recently uploaded

How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 

Recently uploaded (20)

How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 

Cryptography Presentation

  • 1. CRYPTOGRAPHY COURSE: CIS2222 SCHOOL: T.C.I. COMM. COLLEGEDATE: MAY 11, 2015 PRESENTER: DONTE FRANCIS 1
  • 2. WHAT IS CRYPTOGRAPHY? BRIEF HISTORY OF CRYPTOGRAPHY WHERE IS CRYPTOGRAPHY USED TODAY? SYNOPSIS: IMPORTANCE OF CRYPTOGRAPHY IS CRYPTOGRAPHY SAFE? CONCLUSION RESTRICTIONS OF CRYPTOGRAPHY 2
  • 3. WHAT IS CRYPTOGRAPHY? Cryptography is the process of encrypting and decrypting messages to and from the sender and receiver to maintain integrity, secrecy and/or protection of confidential information. 3
  • 4. WHAT IS CRYPTOGRAPHY? Terminologies: Encryption: The process of converting plaintext to cipher text. Decryption: The process of converting cipher text to plaintext. 4 Plaintext: Data that has not been converted; original text. Cipher text: Data that has been converted.
  • 5. Earliest known use of cryptography was in Egypt (ca 1900 BCE) carved into a stone. BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 5
  • 6. Hebrew masters and scholars were the first to use simple cipher based on substitution. BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 A = Z, B = Y, C = X, etc. Hebrew ciphers 6
  • 7. 5th century BC Spartan introduced the first military strategist’s cryptography. BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 Scytale 7
  • 8. One of history’s most famous ciphers called Ceasar cipher (named after Julius Cipher) BRIEF HISTORY OF CRYPTOGRAPHY: http://www.posterus.sk/?p=13784 Caesar Cipher 8
  • 9. The modern field of cryptography is computerised and can be divided into two kinds, symmetric-key and asymmetric-key cryptography. WHERE IS CRYPTOGRAPHY USED TODAY? 9
  • 10. symmetric-key cryptography: encryption method in which both the sender and receiver share the same key (a unique way of decrypting messages). asymmetric-key cryptography: encryption method of using two keys; a public and a private key. key: a secret or public way of encrypting and/or decrypting cipher text. WHERE IS CRYPTOGRAPHY USED TODAY? Terminologies 10
  • 11. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key Cryptography 11
  • 12. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key Cryptography Caesar Cipher Circle 12
  • 13. WHERE IS CRYPTOGRAPHY USED TODAY? Symmetric-key Cryptography 13
  • 14. WHERE IS CRYPTOGRAPHY USED TODAY? Asymmetric-key Cryptography 14
  • 15. WHERE IS CRYPTOGRAPHY USED TODAY? Asymmetric-key Cryptography 15
  • 16. WHERE IS CRYPTOGRAPHY USED TODAY? Device Password Alarm Systems ATMS & CREDIT CARDS ATMS & CREDIT CARDSONLINE USE 16
  • 17. In some countries, even the domestic use of cryptography is, or has been, restricted. RESTRICTIONS OF CRYPTOGRAPHY According to Crypto Law Survey (2013), “In China and Iran, a license is still required to use cryptography.” 17
  • 18. Many countries have tight restrictions on the use of cryptography. Among the more restrictive are laws in Belarus, Kazakhstan, Mongolia, Pakistan, Singapore, Tunisia, and Vietnam. Link: (http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/cryptographic-policies-countries.htm) RESTRICTIONS OF CRYPTOGRAPHY 18
  • 19. In the United States, cryptography is legal for domestic use, but there has been much conflict over legal issues related to cryptography. RESTRICTIONS OF CRYPTOGRAPHY 19 Did you know? After World War II, it was illegal in the US to sell or distribute encryption technology overseas (Rosenoer, 1995).
  • 20. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to decrypt files or hand over passwords that protect encryption keys. Failure to comply is an offence in its own right, punishable on conviction by a two-year jail sentence or up to five years in cases involving national security. Link: (http://www.pcworld.com/article/137881/uk_data_encryption_disclosure_law_takes_effect.html) RESTRICTIONS OF CRYPTOGRAPHY 20
  • 21. Adobe, lost all due to everything being accessed by hackers (a group of people that seeks and exploits weaknesses in a computer system or computer network). October 2013; • Customer Identities; • Customer Passwords; • All belonging to over 3 Million Adobe Customers. Scenario: 21
  • 22. Cryptanalysis: • Definition: The study of analysing information systems in order to study the hidden aspects of the systems • Espionage • Bribery • Burglary • Defection 22
  • 23. Cryptanalysis: • Governments have long recognised the potential benefits of cryptanalysis for intelligence, both military and diplomatic, and established dedicated organisations devoted to breaking the codes and ciphers of other nations. "Breaking codes: An impossible task?". BBC News. June 21, 2004. 23
  • 24. Adobe, lost all due to everything being accessed by hackers (a group of people that seeks and exploits weaknesses in a computer system or computer network). IS CRYPTOGRAPHY SAFE? October 2013; • Customer Identities; • Customer Passwords; • All belonging to over 3 Million Adobe Customers. Scenario: 24
  • 25. IS CRYPTOGRAPHY SAFE? October 2013; • Customer Identities; • Customer Passwords; • All belonging to over 3 Million Adobe Customers. Scenario: There is a diamond of good news in their announcement. They had encrypted their data. GOOD NEWS! ENCRYPTED! ENCRYPTED! 25
  • 26. CRYPTOGRAPHY BENEFITS: • The tools of encryption and key management can (and should, especially after this scenario) be applied at numerous layers of business to protect, isolate, and control data. • Adobe did not lose anything! IMPORTANCE OF CRYPTOGRAPHY 26
  • 28. CONCLUSION In conclusion, we can therefore agree that cryptography is not alone the process of encrypting and decrypting confidential information; it is the evolutionary need for life. It is easy to deploy and use and provides a strong protection against data thieves. 28