SlideShare a Scribd company logo
1 of 6
2
(PKI)
Public Key Cryptography &
Hashing
▶ Each person will have two keys each
– Public Key
– Private Key
– This is called a ‘Key Pair’
▶ Key Pair is mathematically linked to each other
– You cannot guess or derive one key from the other key
– One key is used for encryption and only the other key from that key pair can be used for decryption.
– Public Key is shared in public space like internet, social media or email
– Private Key is confidential and hence kept very securely
PUBLIC KEY CRYPTOGRAPHY
Sundar Venkat
Public Space / Internet
Venkat's Private Key
Venkat’s Public Key
Sundar’s Private Key
Sundar’s Public Key
3
▶ Let us assume Sundar wants to send a secret message to Venkat
▶ Sundar will encrypt the message with Venkat’s Public Key and send the ciphertext to Venkat
▶ As the key pair is mathematically linked, only Venkat’s private key can decrypt the message. No other key can decrypt this
message. Venkat will decrypt the message using his private key to retrieve the original information
▶ As two keys are used for encryption/decryption process, it is called asymmetric key encryption. It is also known as Public Key
cryptography as the public key is shared to ensure secure communication.
PUBLIC KEY CRYPTOGRAPHY
Sundar
This is a secret
information.
Information in
Plaintext
DJ4209MFD09423NMDSFVGU32
U09FGDMASDF930854JDSAF034
NJGR897KSD39KDSALASDFJL39
Ciphertext
Venkat
This is a secret
information.
Information in
Plaintext
Encryption
Algorithm
Decryption
Algorithm
Venkatesh’s Private Key
Venkatesh’s Public Key
4
HASHING
• ▶Hashing / Hash Function is a mathematical function used to convert any data of any arbitrary length to
fixed length hexadecimal number. There are no keys required for this method to work.
• ▶Irrespective of the length, type or nature of data, a hashing algorithm will always output a fixed length
hexadecimal number
• ▶This fixed length output is called Hash Value or Message Digest. Even a single change in character can
result in a completely different hash value. Hence it is considered as the digital thumbprint of the
data.
• ▶From the hash value, you cannot retrieve original message that generated this hash value. Hence it is also
called one way encryption
Hashing
Algorithm
Fixed Length
Hash Value
Algorithm Output
Length
(Bits)
Output
Length
(Bytes)
Message Hash Value Hexadecimal
Length
(Binary bytes)
SHA256 256 32 Hello World a591a6d40bf420404a011733cfb7b190d
62c65bf0bcda32b57b277d9ad9f146e
64
SHA256 256 32 Hello World! 7f83b1657ff1fc53b92dc18148a1d65dfc2
d4b1fa3d677284addd200126d9069
64
SHA256 256 32 Cryptography is
awesome
2d601088ecb12661935f2d2c89e7fac71e
314e83064ba1d6fdd9eb8ee5dffa98
64
Input Data of varying
length & type
Public Key Infrastructure (PKI)

More Related Content

Similar to Encrypto.pptx

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Journals
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
MohamedNowfeek1
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
jemtallon
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
Thivya Devaraj
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 

Similar to Encrypto.pptx (20)

Network security
Network securityNetwork security
Network security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
CryptoGraphy Module in Mulesoft
CryptoGraphy Module in MulesoftCryptoGraphy Module in Mulesoft
CryptoGraphy Module in Mulesoft
 
04 authentication
04 authentication04 authentication
04 authentication
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Cyptography and network security unit 3-1
Cyptography and network security unit 3-1Cyptography and network security unit 3-1
Cyptography and network security unit 3-1
 
Pooguzhali
PooguzhaliPooguzhali
Pooguzhali
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
CISSP Week 16
CISSP Week 16CISSP Week 16
CISSP Week 16
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Master thesis 14023164
Master thesis 14023164Master thesis 14023164
Master thesis 14023164
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 

More from karthikvcyber

Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
karthikvcyber
 
cybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecurity
karthikvcyber
 

More from karthikvcyber (20)

Security Incident machnism Security Incident machnismSecurity Incident machni...
Security Incident machnism Security Incident machnismSecurity Incident machni...Security Incident machnism Security Incident machnismSecurity Incident machni...
Security Incident machnism Security Incident machnismSecurity Incident machni...
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
 
cybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecuritycybersecurity
cybersecuritycybersecuritycybersecuritycybersecurity
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
 
OSINT.pptx
OSINT.pptxOSINT.pptx
OSINT.pptx
 
PID-PPID.pptx
PID-PPID.pptxPID-PPID.pptx
PID-PPID.pptx
 
Authentication.pptx
Authentication.pptxAuthentication.pptx
Authentication.pptx
 
SIEM.pptx
SIEM.pptxSIEM.pptx
SIEM.pptx
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
fileanddirectory-PID.pptx
fileanddirectory-PID.pptxfileanddirectory-PID.pptx
fileanddirectory-PID.pptx
 
CS_Tuto.ppt
CS_Tuto.pptCS_Tuto.ppt
CS_Tuto.ppt
 
Vuln.ppt
Vuln.pptVuln.ppt
Vuln.ppt
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
 
Authorisation.pptx
Authorisation.pptxAuthorisation.pptx
Authorisation.pptx
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
CCNP.ppt
CCNP.pptCCNP.ppt
CCNP.ppt
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
OSI TCP-IP.pptx
OSI TCP-IP.pptxOSI TCP-IP.pptx
OSI TCP-IP.pptx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Encrypto.pptx

  • 3. ▶ Each person will have two keys each – Public Key – Private Key – This is called a ‘Key Pair’ ▶ Key Pair is mathematically linked to each other – You cannot guess or derive one key from the other key – One key is used for encryption and only the other key from that key pair can be used for decryption. – Public Key is shared in public space like internet, social media or email – Private Key is confidential and hence kept very securely PUBLIC KEY CRYPTOGRAPHY Sundar Venkat Public Space / Internet Venkat's Private Key Venkat’s Public Key Sundar’s Private Key Sundar’s Public Key 3
  • 4. ▶ Let us assume Sundar wants to send a secret message to Venkat ▶ Sundar will encrypt the message with Venkat’s Public Key and send the ciphertext to Venkat ▶ As the key pair is mathematically linked, only Venkat’s private key can decrypt the message. No other key can decrypt this message. Venkat will decrypt the message using his private key to retrieve the original information ▶ As two keys are used for encryption/decryption process, it is called asymmetric key encryption. It is also known as Public Key cryptography as the public key is shared to ensure secure communication. PUBLIC KEY CRYPTOGRAPHY Sundar This is a secret information. Information in Plaintext DJ4209MFD09423NMDSFVGU32 U09FGDMASDF930854JDSAF034 NJGR897KSD39KDSALASDFJL39 Ciphertext Venkat This is a secret information. Information in Plaintext Encryption Algorithm Decryption Algorithm Venkatesh’s Private Key Venkatesh’s Public Key 4
  • 5. HASHING • ▶Hashing / Hash Function is a mathematical function used to convert any data of any arbitrary length to fixed length hexadecimal number. There are no keys required for this method to work. • ▶Irrespective of the length, type or nature of data, a hashing algorithm will always output a fixed length hexadecimal number • ▶This fixed length output is called Hash Value or Message Digest. Even a single change in character can result in a completely different hash value. Hence it is considered as the digital thumbprint of the data. • ▶From the hash value, you cannot retrieve original message that generated this hash value. Hence it is also called one way encryption Hashing Algorithm Fixed Length Hash Value Algorithm Output Length (Bits) Output Length (Bytes) Message Hash Value Hexadecimal Length (Binary bytes) SHA256 256 32 Hello World a591a6d40bf420404a011733cfb7b190d 62c65bf0bcda32b57b277d9ad9f146e 64 SHA256 256 32 Hello World! 7f83b1657ff1fc53b92dc18148a1d65dfc2 d4b1fa3d677284addd200126d9069 64 SHA256 256 32 Cryptography is awesome 2d601088ecb12661935f2d2c89e7fac71e 314e83064ba1d6fdd9eb8ee5dffa98 64 Input Data of varying length & type