SlideShare a Scribd company logo
NAVYA RAO
Presentation
by
CONTENTS
• DEFINITION
• CODES & CIPHERS
• HISTORY
• TYPES OF CRYPTOGRAPHY
• MODERN CRYPTOGRAPHY
• WHERE WE USE CRYPTOGRAPHY TECHNIQUES ?
• ADVANTAGES AND DISADVANTAGES
WHAT IS CRYPTOGRAPHY ?
CRYPTOGRAPHY
Greek word “crypto” meaning hidden or
secret, and “graphien” which means
“writing”.
Cryptology help us in performing secure
communications
through networks without allowing the
information dissemination to third
party.
FNNC LNQMHMF
ANSWER :
GOOD MORNING
DO YOU UNDERSTAND
THIS ?
K = J
L = K
M = L
N = M
O = N
P = O
Q = P
R = Q
A = Z
B = A
C = B
D = C
E = D
F = E
G = F
H = G
I = H
J = I
S = R
T = S
U = T
V = U
W =V
X = W
Y = X
Z = Y
CIPHER TEXT
The coded message is known as
Ciphertext. It depends upon the plaintext
and the secret key .
PLAIN TEXT
An original intelligible message or
data that is fed into the algorithm as
input .
The process of conversion of plaintext
into ciphertext is known as encryption.
The algorithm to encrypt data are called
as ciphers and the output they produced
is called ciphertext .
ENCRYPTION
DECRYPTION
Restoring the plaintext from cipher
text is known as decryption.
PUBLIC KEY
Public key is used to encrypt plaintext.
They are named as public keys because
they can be made public.
PRIVATE KEY
Secret keys are used to decrypt
ciphertext back to plaintext. They are
named as such because they are mean to
be private/secret.
Codes and Ciphers
 Ciphers are the way to scramble messages
so that people do not understand them modern
ciphers work with individual bits
 Codes usually work on larger chunks like words.
 While ciphers are mathematical algorithms
codes involve mapping from one language to
another,depend on code book ,code maker
 Cryptanalysis is not possible with encoded
messages since there is no math algorithm
VARIOUS KINDS OF CIPHERS
1) SUBSTITUTION CIPHERS
2) TRANSPOSITION CIPHERS
3) RAIL FENCE CIPHERS
4) ROUTE CIPHERS
SIMPLE CIPHERS (substitution ciphers)
HISTORY OF CRYPTOGRAPHY
Origin of cryptography 2000 B.C in Egypt
Trithemius German monk authored 6 books in 1518
on polygraphia and created a poly alphabetic cipher.
Nazi Germany used cryptography in World war I,II
Hitler used cryptography techniques to send
messages to his army
Mary queen of scots lost her life due to the coded
message which was being smuggled out of prison
being intercepted and decoded .
German lorenz cipher machine used in world war
II to encrypt very high level general staff messages .
Military enigma machine invented by German
engineer Arthur at end of world war I .
TYPES OF CRYPTOGRAPHY
Symmetric key cryptogarphy
Quantum cryptography
Post Quantum cryptography
•Hash function cryptography
•Code based cryptography
Public key cryptography
Latice based cryptography
MODERN CRYPTOGRAPHY
• Shannon was the front runner of modern
cryptography based on mathematics used by
government organisations like NSA .
• In 1970 Data Encryption System (DES) brought by
IBM now being replaced by AES (advanced
encryption system) .
• Recently a public key called Defi Hellman key
introduced new method of key distribution and
New class of coding algorthm
• Private and public keys diminished the reqt of
secure channels
DES
• Block cipher which work by running an operation
for 16 rounds on block of 64 bits
• On each round it takes the second half of the
plaintext (32 bits) and transform it into different
texts using a pre designed algorithm (RSA – Ron
Rivest Adi Shamir Leonared Adlman)
• It does a XOR operation of the result with the first
half of the palintext
• The result is prosessed by algorithm in the next step
while the second half is XOR with the result of the
first
WHERE DOES CRYPTOGRAPHY
TECHNIQUES USED ?
 Military agencies
 Industries
 Internet banking
 Bussiness deals
 Electronic money
 Computer passwords
 Network communication
 Private confidential matters
 Facebook,Gmail
 HTTPS site
ADVANTAGES
• It hides the message and your privacy is safe such as
financial reports,employee data,medical records,etc.
(Seceracy & integrity in transmission & storage)
• No one would be able to know what it says unless
there’s a key to code (authentication of identity)
• You can write whatever you want and how ever you
want to keep your code a secret.
• More secure than stegnography
• Does not need any additional carrier
• Used to scramble satellite signals
ADVANTAGES
• Credentialing systems (proving the
competance)
• Digital signatures (mechanism by which
message is authenticated)
• Electronic money transfer,electronic fund
transfer (EFT)
• Threshold crypto system (require minimum
number of parties to decrypt)
• Secure multi-party computation
DISADVANTAGES
• It takes long time to figure out the code
• It takes long to create the code
• If you were to send a code to another
person in the past , it will take long to get
to that person
• Overall cryptography is a long process
My cryptography

More Related Content

What's hot

Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
amiteshg
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
Anubhav Sokhal
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
Donte Francis
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Crytography
CrytographyCrytography
Crytography
Mostak Ahmed
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography
CryptographyCryptography
Cryptography
PPT4U
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 

What's hot (20)

Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to My cryptography

Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
Cryptography
CryptographyCryptography
Cryptography
Neeraj Mali
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
Manjarul Hoque
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
Ben Rothke
 
Cryptography
CryptographyCryptography
Cryptography
Hassan Osama
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
prasenjeetd
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
3min tech talk on cryptography
3min tech talk on cryptography3min tech talk on cryptography
3min tech talk on cryptography
Dev Gupta
 
Cryptography
CryptographyCryptography
Cryptography
Askme.com
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
SudhanshuKarna
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
SudhanshuKarna
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In CryptographyAbhishek Nand
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
sunil sharma
 

Similar to My cryptography (20)

Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Cryptography
CryptographyCryptography
Cryptography
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
3min tech talk on cryptography
3min tech talk on cryptography3min tech talk on cryptography
3min tech talk on cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
Number Theory In Cryptography
Number Theory In CryptographyNumber Theory In Cryptography
Number Theory In Cryptography
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 

Recently uploaded

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

My cryptography

  • 1.
  • 3. CONTENTS • DEFINITION • CODES & CIPHERS • HISTORY • TYPES OF CRYPTOGRAPHY • MODERN CRYPTOGRAPHY • WHERE WE USE CRYPTOGRAPHY TECHNIQUES ? • ADVANTAGES AND DISADVANTAGES
  • 5. CRYPTOGRAPHY Greek word “crypto” meaning hidden or secret, and “graphien” which means “writing”. Cryptology help us in performing secure communications through networks without allowing the information dissemination to third party.
  • 6. FNNC LNQMHMF ANSWER : GOOD MORNING DO YOU UNDERSTAND THIS ?
  • 7. K = J L = K M = L N = M O = N P = O Q = P R = Q A = Z B = A C = B D = C E = D F = E G = F H = G I = H J = I S = R T = S U = T V = U W =V X = W Y = X Z = Y
  • 8.
  • 9. CIPHER TEXT The coded message is known as Ciphertext. It depends upon the plaintext and the secret key . PLAIN TEXT An original intelligible message or data that is fed into the algorithm as input .
  • 10. The process of conversion of plaintext into ciphertext is known as encryption. The algorithm to encrypt data are called as ciphers and the output they produced is called ciphertext . ENCRYPTION DECRYPTION Restoring the plaintext from cipher text is known as decryption.
  • 11. PUBLIC KEY Public key is used to encrypt plaintext. They are named as public keys because they can be made public. PRIVATE KEY Secret keys are used to decrypt ciphertext back to plaintext. They are named as such because they are mean to be private/secret.
  • 12.
  • 13. Codes and Ciphers  Ciphers are the way to scramble messages so that people do not understand them modern ciphers work with individual bits  Codes usually work on larger chunks like words.  While ciphers are mathematical algorithms codes involve mapping from one language to another,depend on code book ,code maker  Cryptanalysis is not possible with encoded messages since there is no math algorithm
  • 14. VARIOUS KINDS OF CIPHERS 1) SUBSTITUTION CIPHERS 2) TRANSPOSITION CIPHERS 3) RAIL FENCE CIPHERS 4) ROUTE CIPHERS
  • 16. HISTORY OF CRYPTOGRAPHY Origin of cryptography 2000 B.C in Egypt Trithemius German monk authored 6 books in 1518 on polygraphia and created a poly alphabetic cipher. Nazi Germany used cryptography in World war I,II Hitler used cryptography techniques to send messages to his army Mary queen of scots lost her life due to the coded message which was being smuggled out of prison being intercepted and decoded .
  • 17. German lorenz cipher machine used in world war II to encrypt very high level general staff messages .
  • 18. Military enigma machine invented by German engineer Arthur at end of world war I .
  • 19. TYPES OF CRYPTOGRAPHY Symmetric key cryptogarphy Quantum cryptography Post Quantum cryptography •Hash function cryptography •Code based cryptography Public key cryptography Latice based cryptography
  • 20. MODERN CRYPTOGRAPHY • Shannon was the front runner of modern cryptography based on mathematics used by government organisations like NSA . • In 1970 Data Encryption System (DES) brought by IBM now being replaced by AES (advanced encryption system) . • Recently a public key called Defi Hellman key introduced new method of key distribution and New class of coding algorthm • Private and public keys diminished the reqt of secure channels
  • 21. DES • Block cipher which work by running an operation for 16 rounds on block of 64 bits • On each round it takes the second half of the plaintext (32 bits) and transform it into different texts using a pre designed algorithm (RSA – Ron Rivest Adi Shamir Leonared Adlman) • It does a XOR operation of the result with the first half of the palintext • The result is prosessed by algorithm in the next step while the second half is XOR with the result of the first
  • 22. WHERE DOES CRYPTOGRAPHY TECHNIQUES USED ?  Military agencies  Industries  Internet banking  Bussiness deals  Electronic money  Computer passwords  Network communication  Private confidential matters  Facebook,Gmail  HTTPS site
  • 23. ADVANTAGES • It hides the message and your privacy is safe such as financial reports,employee data,medical records,etc. (Seceracy & integrity in transmission & storage) • No one would be able to know what it says unless there’s a key to code (authentication of identity) • You can write whatever you want and how ever you want to keep your code a secret. • More secure than stegnography • Does not need any additional carrier • Used to scramble satellite signals
  • 24. ADVANTAGES • Credentialing systems (proving the competance) • Digital signatures (mechanism by which message is authenticated) • Electronic money transfer,electronic fund transfer (EFT) • Threshold crypto system (require minimum number of parties to decrypt) • Secure multi-party computation
  • 25. DISADVANTAGES • It takes long time to figure out the code • It takes long to create the code • If you were to send a code to another person in the past , it will take long to get to that person • Overall cryptography is a long process