SlideShare a Scribd company logo
1 of 17
Download to read offline
SAVYA SACHI
MUZAFFARPUR INSTITUTE OF
TECHNOLOGY
Mu z a ffar pur
Basic Concepts
Cryptography: The art or science encompassing the principles
and methods of transforming an intelligible message into one
that is unintelligible, and then retransforming that message back
to its original form.
Plaintext: The original intelligible message
Cipher text: The transformed (coded) message
Cipher: An algorithm for transforming an intelligible message
into one that is unintelligible by transposition and/or substitution
methods Key : Some critical information used by the cipher,
known only to the sender & receiver
Encipher (encode): The process of converting plaintext to
cipher text using a cipher and a key
Decipher (decode): the process of converting cipher text
back into plaintext using a cipher and a key
• Cryptanalysis: The study of principles and
methods of transforming an unintelligible
message back into an intelligible message
without knowledge of the key. Also called
code breaking
• Cryptology: Both cryptography and
cryptanalysis
• Code: An algorithm for transforming an
intelligible message into an unintelligible
one using a code-book
Basic Terms Used in Cryptography
1) Plain Text- The original message that is easily readable by humans. It is a term
used in cryptography that refers to a message before encryption or after
decryption. For example, A is a person wishes to send “Hello Friend how are
you” message to the person B. Here “Hello Friend how are you” is a plain text
message.
2) 2) Cipher Text- In cryptography, cipher text is data that has been encrypted. This
text is unreadable until it has been converted into plain text with a key. For
example, “phqgiumealy” is a cipher text produced for “abcdefghijk”.
3) 3) Encryption- It is security tool for computer network. It is process of converting
information (known as plain text ) using an algorithm to make it unreadable
(known as cipher text) to anyone except those processing special knowledge,
usually referred to as a key. It is the most efficient method to achieve data
security. Encryption can protect confidentiality of message. For data encryption,
a secret key is used. Encrypted data is called as cipher text and decrypted data
is called as plain text.
4) Decryption- It is process of taking encoded or encrypted text and converting it
back into original text. Decryption is used for un-encrypting the data with keys or
algorithm. Cryptography uses the decryption technique at the receiver side to
obtain the original message from non-readable message (Cipher Text). The
decryption process requires two things- a Decryption algorithm and a key. A
Decryption algorithm indicates the technique that has been used in Decryption.
Usually, the encryption and decryption algorithm are same.
1) 5) Key- A key is a numeric or alpha numeric text or may be a special symbol.
The Key is used at the time of encryption work on the plain text and at the time
of decryption work on the cipher text. The selection of key plays vital rolein
cryptography process as the security of encryption algorithm fully depends on
it. For example, if A uses a key of 2 to encrypt the Plain Text “University” then
Cipher Text produced will be “wpkxgtkva”.
• A. Symmetric Encryption- This type of cryptography
uses a single key, which is used for encryption and
decryption. The sender uses the key to encrypt the
plaintext and sends the cipher text to the receiver. At
the receiver side, same key will be used to decrypt
the message and get the plaintext. Because there is
common key used for encryption and decryption
process, the secret key cryptography is also known as
symmetric encryption. This was the only type of
encryption method widely known until June 1976.
There are various symmetric key algorithms such as
DES, TRIPLE DES, AES, RC4, RC6, and BLOWFISH
[2].
• B. Asymmetric Encryption- Public-key cryptography,
where key used to encrypt a message is differ from
key used to decrypt a message. In asymmetric or
public-key cryptography, there are two cryptographic
keys: a private key and a public key are used. The
private key is kept secret, while public key may be
distributed. Messages are encrypted with recipients’
public key and decrypted with private key. Some
commonly used asymmetric cryptography techniques
are RSA (Rivest Shamir and Adleman), Diffie-Hellman,
and DSA (Digital Signature Algorithm).
• A significant disadvantage of symmetric ciphers is the key
management necessary to use them securely. Each distinct
pair of communicating parties must, ideally, share a different
key, and perhaps each cipher text exchanged as well. The
number of keys required increases as the square of the
number of network members, which very quickly requires
complex key management schemes to keep them all straight
and secret.
CLASSIFICATION OF CRYPTOGRAPHY: The encryption
algorithms are classified into two broad categories: Symmetric Key and
Asymmetric Key encryption as shown
below/
CRYPTOGRAPHY
SYMMETRIC ASYMMETRIC
DES AES RC4/RC6 RSA DSA Diffie-Hellman
17

More Related Content

What's hot

Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography in Python
Cryptography in PythonCryptography in Python
Cryptography in Python
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Criptography
CriptographyCriptography
Criptography
 

Similar to Encryption

information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
MikiAbera
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 

Similar to Encryption (20)

A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
 
Encryption33.pptx
Encryption33.pptxEncryption33.pptx
Encryption33.pptx
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
cryptography
cryptographycryptography
cryptography
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Asif
AsifAsif
Asif
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 

More from Savyasachi14 (8)

Cryptanalysis by savyasachi
Cryptanalysis by savyasachiCryptanalysis by savyasachi
Cryptanalysis by savyasachi
 
Goals of security
Goals of securityGoals of security
Goals of security
 
Software design
Software designSoftware design
Software design
 
System requirements specification (srs)
System requirements specification (srs)System requirements specification (srs)
System requirements specification (srs)
 
Alpha beta pruning in ai
Alpha beta pruning in aiAlpha beta pruning in ai
Alpha beta pruning in ai
 
Object modeling techniques by savyasachi
Object modeling techniques by savyasachiObject modeling techniques by savyasachi
Object modeling techniques by savyasachi
 
Ids
IdsIds
Ids
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 

Encryption

  • 1. SAVYA SACHI MUZAFFARPUR INSTITUTE OF TECHNOLOGY Mu z a ffar pur
  • 2. Basic Concepts Cryptography: The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form. Plaintext: The original intelligible message Cipher text: The transformed (coded) message Cipher: An algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods Key : Some critical information used by the cipher, known only to the sender & receiver Encipher (encode): The process of converting plaintext to cipher text using a cipher and a key Decipher (decode): the process of converting cipher text back into plaintext using a cipher and a key
  • 3. • Cryptanalysis: The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called code breaking • Cryptology: Both cryptography and cryptanalysis • Code: An algorithm for transforming an intelligible message into an unintelligible one using a code-book
  • 4. Basic Terms Used in Cryptography 1) Plain Text- The original message that is easily readable by humans. It is a term used in cryptography that refers to a message before encryption or after decryption. For example, A is a person wishes to send “Hello Friend how are you” message to the person B. Here “Hello Friend how are you” is a plain text message. 2) 2) Cipher Text- In cryptography, cipher text is data that has been encrypted. This text is unreadable until it has been converted into plain text with a key. For example, “phqgiumealy” is a cipher text produced for “abcdefghijk”. 3) 3) Encryption- It is security tool for computer network. It is process of converting information (known as plain text ) using an algorithm to make it unreadable (known as cipher text) to anyone except those processing special knowledge, usually referred to as a key. It is the most efficient method to achieve data security. Encryption can protect confidentiality of message. For data encryption, a secret key is used. Encrypted data is called as cipher text and decrypted data is called as plain text. 4) Decryption- It is process of taking encoded or encrypted text and converting it back into original text. Decryption is used for un-encrypting the data with keys or algorithm. Cryptography uses the decryption technique at the receiver side to obtain the original message from non-readable message (Cipher Text). The decryption process requires two things- a Decryption algorithm and a key. A Decryption algorithm indicates the technique that has been used in Decryption. Usually, the encryption and decryption algorithm are same.
  • 5. 1) 5) Key- A key is a numeric or alpha numeric text or may be a special symbol. The Key is used at the time of encryption work on the plain text and at the time of decryption work on the cipher text. The selection of key plays vital rolein cryptography process as the security of encryption algorithm fully depends on it. For example, if A uses a key of 2 to encrypt the Plain Text “University” then Cipher Text produced will be “wpkxgtkva”.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. • A. Symmetric Encryption- This type of cryptography uses a single key, which is used for encryption and decryption. The sender uses the key to encrypt the plaintext and sends the cipher text to the receiver. At the receiver side, same key will be used to decrypt the message and get the plaintext. Because there is common key used for encryption and decryption process, the secret key cryptography is also known as symmetric encryption. This was the only type of encryption method widely known until June 1976. There are various symmetric key algorithms such as DES, TRIPLE DES, AES, RC4, RC6, and BLOWFISH [2].
  • 15. • B. Asymmetric Encryption- Public-key cryptography, where key used to encrypt a message is differ from key used to decrypt a message. In asymmetric or public-key cryptography, there are two cryptographic keys: a private key and a public key are used. The private key is kept secret, while public key may be distributed. Messages are encrypted with recipients’ public key and decrypted with private key. Some commonly used asymmetric cryptography techniques are RSA (Rivest Shamir and Adleman), Diffie-Hellman, and DSA (Digital Signature Algorithm). • A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each cipher text exchanged as well. The number of keys required increases as the square of the number of network members, which very quickly requires complex key management schemes to keep them all straight and secret.
  • 16. CLASSIFICATION OF CRYPTOGRAPHY: The encryption algorithms are classified into two broad categories: Symmetric Key and Asymmetric Key encryption as shown below/ CRYPTOGRAPHY SYMMETRIC ASYMMETRIC DES AES RC4/RC6 RSA DSA Diffie-Hellman
  • 17. 17