Cryptography is the science of using mathematics to encrypt and decrypt data. This presentation explains about the cryptography, its history, types i.e. symmetric and asymmetric cryptography.
Basic Talk. 90 minute talk to an audience of Freshmen and Sophomores of IIT Bombay on 23/02/10 as a part of Science Week. Organised by Web and Coding Club. Place: GG 101 (Elec Department)
Cryptography is the science of using mathematics to encrypt and decrypt data. This presentation explains about the cryptography, its history, types i.e. symmetric and asymmetric cryptography.
Basic Talk. 90 minute talk to an audience of Freshmen and Sophomores of IIT Bombay on 23/02/10 as a part of Science Week. Organised by Web and Coding Club. Place: GG 101 (Elec Department)
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxnikitacareer3
Looking for the best engineering colleges in Jaipur for 2024?
Check out our list of the top 10 B.Tech colleges to help you make the right choice for your future career!
1) MNIT
2) MANIPAL UNIV
3) LNMIIT
4) NIMS UNIV
5) JECRC
6) VIVEKANANDA GLOBAL UNIV
7) BIT JAIPUR
8) APEX UNIV
9) AMITY UNIV.
10) JNU
TO KNOW MORE ABOUT COLLEGES, FEES AND PLACEMENT, WATCH THE FULL VIDEO GIVEN BELOW ON "TOP 10 B TECH COLLEGES IN JAIPUR"
https://www.youtube.com/watch?v=vSNje0MBh7g
VISIT CAREER MANTRA PORTAL TO KNOW MORE ABOUT COLLEGES/UNIVERSITITES in Jaipur:
https://careermantra.net/colleges/3378/Jaipur/b-tech
Get all the information you need to plan your next steps in your medical career with Career Mantra!
https://careermantra.net/
3. CONTENTS
• DEFINITION
• CODES & CIPHERS
• HISTORY
• TYPES OF CRYPTOGRAPHY
• MODERN CRYPTOGRAPHY
• WHERE WE USE CRYPTOGRAPHY TECHNIQUES ?
• ADVANTAGES AND DISADVANTAGES
5. CRYPTOGRAPHY
Greek word “crypto” meaning hidden or
secret, and “graphien” which means
“writing”.
Cryptology help us in performing secure
communications
through networks without allowing the
information dissemination to third
party.
7. K = J
L = K
M = L
N = M
O = N
P = O
Q = P
R = Q
A = Z
B = A
C = B
D = C
E = D
F = E
G = F
H = G
I = H
J = I
S = R
T = S
U = T
V = U
W =V
X = W
Y = X
Z = Y
8.
9. CIPHER TEXT
The coded message is known as
Ciphertext. It depends upon the plaintext
and the secret key .
PLAIN TEXT
An original intelligible message or
data that is fed into the algorithm as
input .
10. The process of conversion of plaintext
into ciphertext is known as encryption.
The algorithm to encrypt data are called
as ciphers and the output they produced
is called ciphertext .
ENCRYPTION
DECRYPTION
Restoring the plaintext from cipher
text is known as decryption.
11. PUBLIC KEY
Public key is used to encrypt plaintext.
They are named as public keys because
they can be made public.
PRIVATE KEY
Secret keys are used to decrypt
ciphertext back to plaintext. They are
named as such because they are mean to
be private/secret.
12.
13. Codes and Ciphers
Ciphers are the way to scramble messages
so that people do not understand them modern
ciphers work with individual bits
Codes usually work on larger chunks like words.
While ciphers are mathematical algorithms
codes involve mapping from one language to
another,depend on code book ,code maker
Cryptanalysis is not possible with encoded
messages since there is no math algorithm
14. VARIOUS KINDS OF CIPHERS
1) SUBSTITUTION CIPHERS
2) TRANSPOSITION CIPHERS
3) RAIL FENCE CIPHERS
4) ROUTE CIPHERS
16. HISTORY OF CRYPTOGRAPHY
Origin of cryptography 2000 B.C in Egypt
Trithemius German monk authored 6 books in 1518
on polygraphia and created a poly alphabetic cipher.
Nazi Germany used cryptography in World war I,II
Hitler used cryptography techniques to send
messages to his army
Mary queen of scots lost her life due to the coded
message which was being smuggled out of prison
being intercepted and decoded .
17. German lorenz cipher machine used in world war
II to encrypt very high level general staff messages .
19. TYPES OF CRYPTOGRAPHY
Symmetric key cryptogarphy
Quantum cryptography
Post Quantum cryptography
•Hash function cryptography
•Code based cryptography
Public key cryptography
Latice based cryptography
20. MODERN CRYPTOGRAPHY
• Shannon was the front runner of modern
cryptography based on mathematics used by
government organisations like NSA .
• In 1970 Data Encryption System (DES) brought by
IBM now being replaced by AES (advanced
encryption system) .
• Recently a public key called Defi Hellman key
introduced new method of key distribution and
New class of coding algorthm
• Private and public keys diminished the reqt of
secure channels
21. DES
• Block cipher which work by running an operation
for 16 rounds on block of 64 bits
• On each round it takes the second half of the
plaintext (32 bits) and transform it into different
texts using a pre designed algorithm (RSA – Ron
Rivest Adi Shamir Leonared Adlman)
• It does a XOR operation of the result with the first
half of the palintext
• The result is prosessed by algorithm in the next step
while the second half is XOR with the result of the
first
22. WHERE DOES CRYPTOGRAPHY
TECHNIQUES USED ?
Military agencies
Industries
Internet banking
Bussiness deals
Electronic money
Computer passwords
Network communication
Private confidential matters
Facebook,Gmail
HTTPS site
23. ADVANTAGES
• It hides the message and your privacy is safe such as
financial reports,employee data,medical records,etc.
(Seceracy & integrity in transmission & storage)
• No one would be able to know what it says unless
there’s a key to code (authentication of identity)
• You can write whatever you want and how ever you
want to keep your code a secret.
• More secure than stegnography
• Does not need any additional carrier
• Used to scramble satellite signals
24. ADVANTAGES
• Credentialing systems (proving the
competance)
• Digital signatures (mechanism by which
message is authenticated)
• Electronic money transfer,electronic fund
transfer (EFT)
• Threshold crypto system (require minimum
number of parties to decrypt)
• Secure multi-party computation
25. DISADVANTAGES
• It takes long time to figure out the code
• It takes long to create the code
• If you were to send a code to another
person in the past , it will take long to get
to that person
• Overall cryptography is a long process