SlideShare a Scribd company logo
1 of 19
10/05/2018
Prepared by…….
 Cryptography is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can
read and process it.
C = Ek(P)
P = Dk(C)
where P = plaintext, C = cipher text, E = the encryption method,
D = the decryption method, and
k = the key.
The word is derived from the Greek kryptos meaning hidden and
“gráphein”- “to write”
 A modern cipher was use by Julius Caesar (100 BC to 44 BC), who did not
trust his messengers when communicating with his governors and officers.
For this reason, he created a system in which each character in his
messages was replaced by a character three positions ahead of it in the
Roman alphabet.
 A perfect Example of Cryptography is Enigma. That’s use during world
war ii by Adolf Hitler, to communicate with Nazi army. There are approx
158,962,555,217,826,360,000 nearly 159 quintillion
• Data Privacy(confidentiality)
• Data Authenticity(it came from from where it
claims)
• Data integrity(it has not been modified on the
way) in the digital world
• Non-repudiation:
A mechanism to prove that the sender really
sent this message.
 Plaintext
 Encryption Algorithm
 Cipher text.
 Decryption Algorithm
 Encryption Key
 Decryption Key
 Plaintext
the original, unencrypted text that requires encryption like
email files databases credit card details any sensitive data.
 Encryption Algorithm & Decryption Algorithm
There are various type of Encryption Algorithm like
• RSA(Ron Rivest, Adi Shamir, and Leonard Adleman)
• DES(Data Encryption Standard)
• AES(Advanced Encryption Standard)
 Cipher text:
The encryption process uses algorithms to encrypt
data. There are two main ways these algorithms
process this data:
 stream cipher : one bit or one byte at a time
 block cipher : Blocks of 64, 128, 192 or 256 bits at a Time
Encryption Key/Decryption Key
A cryptographic key is a string of bits used by a cryptographic
algorithm to transform plain text into cipher text or vice versa
 Public Key:
A public key may be placed in an open access directory for
decryption of the digital signature of the sender, the public key
of the message recipient encrypts the sender’s message.
 Private Key:
A private key is shared only with the key's initiator, ensuring
security.
Fundamentally, there are two types of cryptosystems
based on the manner in which encryption-decryption
is carried out in the system
 Symmetric Key Encryption
 Asymmetric Key Encryption
 Hash Functions
 The encryption process where same keys are used for
encrypting and decrypting the information is known as
Symmetric Key Encryption. Example- AES , DES ,3DES.
The encryption process where different keys are used for
encrypting and decrypting the information is known as
Asymmetric Key Encryption. Example -RSA , DIFFLE.
 Hash functions, also
called message
digests and one-way
encryption, are algorithms
that, in essence, use no key
.Instead, a fixed-length hash
value is computed based upon
the plaintext that makes it
impossible for either the
contents or length of the
plaintext to be
recovered. Hash algorithms
are typically used to provide
a digital fingerprint of a file's
contents . Example – MD(128
bit).SHA-1(160 bit).
 Digital Signatures
◦ Where the comes form right person or not.
 Electronic Money( Cryptocurrency)
◦ Like –Bitcoin , Litecoin , Ethereum .
 Secure Network Communications
o Developed Secure Socket Layer (SSL) for providing data security
layered between TCP/IP such as HTTP, or FTP. SSL supports data
encryption, server authentication, message integrity, and client
authentication for TCP/IP connections.
Security in the Internet is improving. The increasing use of the
Internet for commerce is improving the deployed technology to
protect the financial transactions
Cryptography may be groovy technology, but since security is a
human issue, cryptography is only as good as the practices of
the people who use it. Users leave keys lying around, choose
easily remembered keys, don't change keys for years. The
complexity of cryptography effectively puts it outside the
understanding of most people and so motivation for the
practices of cryptographic security is not available
Do you have any questions about cryptography that I didn’t
answer? Any best practices you have used to protect yourself
from threats?
 https://www.cl.cam.ac.uk/~jac22/books/mm/book/node352.
html
 http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/S
Sim/life.html
 https://www.tutorialspoint.com/cryptography/benefits_and_dr
awbacks.htm
 http://www.umsl.edu/~siegelj/information_theory/projects/de
s.netau.net/Cryptography%20and%20goals.html
 http://lrrpublic.cli.det.nsw.edu.au/lrrSecure/Sites/Web/5264/
other/5264_encryption_overview_text_pop.html
 https://blog.storagecraft.com/5-common-encryption-
algorithms
 https://www.techopedia.com/definition/16139/public-key
 http://www.cs.du.edu/~snarayan/crypt/vigenere.html
THE END

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography 1
Cryptography 1Cryptography 1
Cryptography 1
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Overview Of Cryptography

Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdfSetiya Nugroho
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 

Similar to Overview Of Cryptography (20)

Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Sw2
Sw2Sw2
Sw2
 
Cryptography
CryptographyCryptography
Cryptography
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Data encryption
Data encryptionData encryption
Data encryption
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Overview Of Cryptography

  • 2.  Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. C = Ek(P) P = Dk(C) where P = plaintext, C = cipher text, E = the encryption method, D = the decryption method, and k = the key.
  • 3. The word is derived from the Greek kryptos meaning hidden and “gráphein”- “to write”
  • 4.  A modern cipher was use by Julius Caesar (100 BC to 44 BC), who did not trust his messengers when communicating with his governors and officers. For this reason, he created a system in which each character in his messages was replaced by a character three positions ahead of it in the Roman alphabet.  A perfect Example of Cryptography is Enigma. That’s use during world war ii by Adolf Hitler, to communicate with Nazi army. There are approx 158,962,555,217,826,360,000 nearly 159 quintillion
  • 5.
  • 6. • Data Privacy(confidentiality) • Data Authenticity(it came from from where it claims) • Data integrity(it has not been modified on the way) in the digital world • Non-repudiation: A mechanism to prove that the sender really sent this message.
  • 7.  Plaintext  Encryption Algorithm  Cipher text.  Decryption Algorithm  Encryption Key  Decryption Key
  • 8.  Plaintext the original, unencrypted text that requires encryption like email files databases credit card details any sensitive data.  Encryption Algorithm & Decryption Algorithm There are various type of Encryption Algorithm like • RSA(Ron Rivest, Adi Shamir, and Leonard Adleman) • DES(Data Encryption Standard) • AES(Advanced Encryption Standard)
  • 9.  Cipher text: The encryption process uses algorithms to encrypt data. There are two main ways these algorithms process this data:  stream cipher : one bit or one byte at a time  block cipher : Blocks of 64, 128, 192 or 256 bits at a Time
  • 10.
  • 11. Encryption Key/Decryption Key A cryptographic key is a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa  Public Key: A public key may be placed in an open access directory for decryption of the digital signature of the sender, the public key of the message recipient encrypts the sender’s message.  Private Key: A private key is shared only with the key's initiator, ensuring security.
  • 12. Fundamentally, there are two types of cryptosystems based on the manner in which encryption-decryption is carried out in the system  Symmetric Key Encryption  Asymmetric Key Encryption  Hash Functions
  • 13.  The encryption process where same keys are used for encrypting and decrypting the information is known as Symmetric Key Encryption. Example- AES , DES ,3DES.
  • 14. The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Key Encryption. Example -RSA , DIFFLE.
  • 15.  Hash functions, also called message digests and one-way encryption, are algorithms that, in essence, use no key .Instead, a fixed-length hash value is computed based upon the plaintext that makes it impossible for either the contents or length of the plaintext to be recovered. Hash algorithms are typically used to provide a digital fingerprint of a file's contents . Example – MD(128 bit).SHA-1(160 bit).
  • 16.  Digital Signatures ◦ Where the comes form right person or not.  Electronic Money( Cryptocurrency) ◦ Like –Bitcoin , Litecoin , Ethereum .  Secure Network Communications o Developed Secure Socket Layer (SSL) for providing data security layered between TCP/IP such as HTTP, or FTP. SSL supports data encryption, server authentication, message integrity, and client authentication for TCP/IP connections.
  • 17. Security in the Internet is improving. The increasing use of the Internet for commerce is improving the deployed technology to protect the financial transactions Cryptography may be groovy technology, but since security is a human issue, cryptography is only as good as the practices of the people who use it. Users leave keys lying around, choose easily remembered keys, don't change keys for years. The complexity of cryptography effectively puts it outside the understanding of most people and so motivation for the practices of cryptographic security is not available Do you have any questions about cryptography that I didn’t answer? Any best practices you have used to protect yourself from threats?
  • 18.  https://www.cl.cam.ac.uk/~jac22/books/mm/book/node352. html  http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/S Sim/life.html  https://www.tutorialspoint.com/cryptography/benefits_and_dr awbacks.htm  http://www.umsl.edu/~siegelj/information_theory/projects/de s.netau.net/Cryptography%20and%20goals.html  http://lrrpublic.cli.det.nsw.edu.au/lrrSecure/Sites/Web/5264/ other/5264_encryption_overview_text_pop.html  https://blog.storagecraft.com/5-common-encryption- algorithms  https://www.techopedia.com/definition/16139/public-key  http://www.cs.du.edu/~snarayan/crypt/vigenere.html