SlideShare a Scribd company logo
1 of 26
Introduction to
Cryptography
-Afif
Contents
• Introduction
• History
• Terminology
• Cryptography Methods
• Difference between Methods
• Application
Introduction
Cryptography:
Cryptography is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and
process it. Cryptography is closely related to the disciplines
of cryptology and cryptanalysis. Cryptography includes techniques such
as microdots, merging words with images, and other ways to hide
information in storage or transit.
German Lorenz cipher machine, used in World War II to
encrypt very-high-level general staff messages.
History
BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing
and Notable Roman ciphers such as the Caesar cipher.
1-1799: Leon Battista Alberti invents polyalphabetic cipher, also known
first mechanical cipher machine.
1800-1899: Joseph Henry builds an electric. In Crimean War, Charles
Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of
the time).
1900-1949: First break of German Army Enigma by Marian Rejewski in
Poland.
1950-1999: Charles Bennett and Gilles Brassard design the
first quantum cryptography protocol, BB84.
2000 to present: Microsoft and its allies vow to end "full
disclosure" of security vulnerabilities by replacing it
with "responsible" disclosure guidelines.
Classic cryptography
The Greek’s idea on cryptography was to
wrap a tape around a stick, and then
write the message on the wound tape.
When the tape was unwound, the
writing would be meaningless. The
receiver of the message would of course
have a stick of the same diameter and
use it to decipher the message.
Reconstructed ancient Greek
scytale, an early cipher device.
Computer era
Cryptanalysis of the new mechanical devices
proved to be both difficult and laborious. Just as
the development of digital computers and
electronics helped in cryptanalysis, it made
possible much more complex ciphers.
Furthermore, computers allowed for the
encryption of any kind of data representable in
any binary format, unlike classical ciphers which
only encrypted written language texts.
An example of simple cryptography
Terminology
Plaintext:
Message that is going to be transmitted or stored is plain text. Anyone
can read plaintext.
Encryption:
The method by which we can hide the actual meaning of plaintext is
called Encryption.
Cipher text:
The result of encryption which results in unreadable gibberish is called
Cipher text.
Decryption:
The method by which the original meaning of cipher text can be
recovered is called Decryption. Simply the process of converting Cipher
text to plaintext is called Decryption.
Key:
Key is the secret piece of information which is used for encryption and
decryption in Cryptography.
Method of Encryption and Decryption
 Some more terms:
Cryptanalysis:
The science of retrieving the plain text from cipher without knowing
the key.
Cryptanalysts:
The people who practice cryptanalysis are called Cryptanalyst.
Cryptosystem:
The combination of algorithm, key, and key management functions
used to perform cryptographic operations.
 Caesar Cipher
The Caesar cipher, also known as a shift cipher, is one of the simplest
forms of encryption. It is a substitution cipher where each letter in the
original message (called the plaintext) is replaced with a letter
corresponding to a certain number of letters up or down in the
alphabet.
Caesar Cipher with shifting value ‘3’
We love
Discrete
Mathematics
Zh oryh
Glvfuhwh
Pdwkhpdwlfv
We love
Discrete
Mathematics
Right shift
of
3
Left shift
of
3
Plaintext Cipher Plaintext
Cryptography Methods
Symmetric Key:
With Symmetric key Cryptography, a single key is used for both
encryption and decryption. In this figure we can see that the sender
uses the key to encrypt the plain text and send the cipher text to the
receiver. The receiver applies the same key to decrypt the message and
recover the plain text because a single key is used for both function.
Symmetric key Cryptography is also called secret key Cryptography.
With this from of Cryptography, it is obvious that the key must be
known to both the sender and the receiver.
Visualization of Symmetric key Cryptography
Asymmetric Key:
Asymmetric cryptography was first publicly described by martin
Hellman and his student Whitfield Diffie in 1976. There are two
different keys are used for encryption and decryption. One key is used
to encrypt the plaintext and the other key is used to decrypt the cipher
text the important point is that it doesn’t matter which key is applied
first but the both key is required for the work. Every user has both a
public key and a private key. The private key is kept secret at all times,
but the public key may be freely distributed.
Visualization of Asymmetric key Cryptography
Difference between Methods
Symmetric Cryptography
Examples of encryption:
DES, 3DES, AES and RC4.
Asymmetric Cryptography
Examples of encryption:
The most common asymmetric encryption
algorithm is RSA
Applications
1. ATM
2. Email-Passwords
3. E-Payment
4. E-Commerce
5. Electronic Voting
6. Defence Services
7. Securing Data
8. Access Control
Thank You!

More Related Content

What's hot

Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellmanchenlahero
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Encryption ppt
Encryption pptEncryption ppt
Encryption pptAnil Neupane
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography pptAnubhav Sokhal
 
Cryptography
CryptographyCryptography
Cryptographysubodh pawar
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithmArpana shree
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipherVaibhav Khanna
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 

What's hot (20)

Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 

Viewers also liked

Cryptography
CryptographyCryptography
CryptographyTushar Swami
 
Cryptography
CryptographyCryptography
Cryptographygueste4c97e
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Cryptography
CryptographyCryptography
CryptographyDeepak Kumar
 
Network security
Network securityNetwork security
Network securityGichelle Amon
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography PresentationDonte Francis
 
Cryptography
CryptographyCryptography
Cryptographyvidhiyarahul
 
Cryptography
CryptographyCryptography
CryptographyVicky Kamboj
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographyAmir Neziri
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risksosuhaibany
 
Building Social Networks
Building Social NetworksBuilding Social Networks
Building Social Networksnyccamp
 
Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Matt Charney
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Network security
Network securityNetwork security
Network security
 
Rsa
RsaRsa
Rsa
 
Steganography
SteganographySteganography
Steganography
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
Building Social Networks
Building Social NetworksBuilding Social Networks
Building Social Networks
 
Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 

Similar to Introduction to Cryptography

Ccn presentation
Ccn presentationCcn presentation
Ccn presentationFaraz Qureshi
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptographyHossain Md Shakhawat
 
Cryptography
CryptographyCryptography
CryptographyNeeraj Mali
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptography
CryptographyCryptography
CryptographyAskme.com
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 
Cryptography
CryptographyCryptography
CryptographyLaibaRehman3
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniqueseditor1knowledgecuddle
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 

Similar to Introduction to Cryptography (20)

Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Encryption
EncryptionEncryption
Encryption
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Cryptography
CryptographyCryptography
Cryptography
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 

More from Md. Afif Al Mamun

Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataMd. Afif Al Mamun
 
Relational Algebra Introduction
Relational Algebra IntroductionRelational Algebra Introduction
Relational Algebra IntroductionMd. Afif Al Mamun
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)Md. Afif Al Mamun
 
Introduction to Software
Introduction to SoftwareIntroduction to Software
Introduction to SoftwareMd. Afif Al Mamun
 
Presentation on pointer.
Presentation on pointer.Presentation on pointer.
Presentation on pointer.Md. Afif Al Mamun
 
Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.Md. Afif Al Mamun
 
Artificial Intelligence(AI).
Artificial Intelligence(AI).Artificial Intelligence(AI).
Artificial Intelligence(AI).Md. Afif Al Mamun
 

More from Md. Afif Al Mamun (10)

Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Relational Algebra Introduction
Relational Algebra IntroductionRelational Algebra Introduction
Relational Algebra Introduction
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
Introduction to Software
Introduction to SoftwareIntroduction to Software
Introduction to Software
 
Parallel Circuits
Parallel CircuitsParallel Circuits
Parallel Circuits
 
Linked list
Linked listLinked list
Linked list
 
Presentation on pointer.
Presentation on pointer.Presentation on pointer.
Presentation on pointer.
 
Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.
 
George Harrison
George HarrisonGeorge Harrison
George Harrison
 
Artificial Intelligence(AI).
Artificial Intelligence(AI).Artificial Intelligence(AI).
Artificial Intelligence(AI).
 

Recently uploaded

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSĂŠrgio Sacani
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...SĂŠrgio Sacani
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 

Introduction to Cryptography

  • 2. Contents • Introduction • History • Terminology • Cryptography Methods • Difference between Methods • Application
  • 3. Introduction Cryptography: Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.
  • 4. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages.
  • 5. History BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing and Notable Roman ciphers such as the Caesar cipher. 1-1799: Leon Battista Alberti invents polyalphabetic cipher, also known first mechanical cipher machine. 1800-1899: Joseph Henry builds an electric. In Crimean War, Charles Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of the time).
  • 6. 1900-1949: First break of German Army Enigma by Marian Rejewski in Poland. 1950-1999: Charles Bennett and Gilles Brassard design the first quantum cryptography protocol, BB84. 2000 to present: Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
  • 7. Classic cryptography The Greek’s idea on cryptography was to wrap a tape around a stick, and then write the message on the wound tape. When the tape was unwound, the writing would be meaningless. The receiver of the message would of course have a stick of the same diameter and use it to decipher the message. Reconstructed ancient Greek scytale, an early cipher device.
  • 8. Computer era Cryptanalysis of the new mechanical devices proved to be both difficult and laborious. Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts. An example of simple cryptography
  • 9. Terminology Plaintext: Message that is going to be transmitted or stored is plain text. Anyone can read plaintext. Encryption: The method by which we can hide the actual meaning of plaintext is called Encryption.
  • 10. Cipher text: The result of encryption which results in unreadable gibberish is called Cipher text. Decryption: The method by which the original meaning of cipher text can be recovered is called Decryption. Simply the process of converting Cipher text to plaintext is called Decryption.
  • 11. Key: Key is the secret piece of information which is used for encryption and decryption in Cryptography.
  • 12. Method of Encryption and Decryption
  • 13.  Some more terms: Cryptanalysis: The science of retrieving the plain text from cipher without knowing the key. Cryptanalysts: The people who practice cryptanalysis are called Cryptanalyst.
  • 14. Cryptosystem: The combination of algorithm, key, and key management functions used to perform cryptographic operations.
  • 15.  Caesar Cipher The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet.
  • 16. Caesar Cipher with shifting value ‘3’
  • 17. We love Discrete Mathematics Zh oryh Glvfuhwh Pdwkhpdwlfv We love Discrete Mathematics Right shift of 3 Left shift of 3 Plaintext Cipher Plaintext
  • 18. Cryptography Methods Symmetric Key: With Symmetric key Cryptography, a single key is used for both encryption and decryption. In this figure we can see that the sender uses the key to encrypt the plain text and send the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plain text because a single key is used for both function. Symmetric key Cryptography is also called secret key Cryptography. With this from of Cryptography, it is obvious that the key must be known to both the sender and the receiver.
  • 19. Visualization of Symmetric key Cryptography
  • 20. Asymmetric Key: Asymmetric cryptography was first publicly described by martin Hellman and his student Whitfield Diffie in 1976. There are two different keys are used for encryption and decryption. One key is used to encrypt the plaintext and the other key is used to decrypt the cipher text the important point is that it doesn’t matter which key is applied first but the both key is required for the work. Every user has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.
  • 21. Visualization of Asymmetric key Cryptography
  • 23. Symmetric Cryptography Examples of encryption: DES, 3DES, AES and RC4.
  • 24. Asymmetric Cryptography Examples of encryption: The most common asymmetric encryption algorithm is RSA
  • 25. Applications 1. ATM 2. Email-Passwords 3. E-Payment 4. E-Commerce 5. Electronic Voting 6. Defence Services 7. Securing Data 8. Access Control