SlideShare a Scribd company logo
1 of 17
Overview of Cryptography 
by 
Roshan Chaudhary 
13ITU031
Introduction 
Cryptography 
is the practice and 
study of techniques 
for secure 
communication in the 
presence of third 
parties. Encrypted 
messages can 
sometimes be broken 
by cryptanalysis, also 
called codebreaking.
THE PURPOSE OF CRYPTOGRAPHY 
 Defending against external/internal 
hackers 
 Defending against industrial espionage 
 Securing E-commerce 
 Securing bank accounts/electronic 
transfers 
 Securing intellectual property 
 Avoiding liability
Some specific security requirements 
 Authentication 
Privacy 
Integrity: assuring the receiver that the 
received message has not been altered 
in any way from the original. 
 Non-repudiation: a mechanism to prove 
that the sender really sent this message.
What is Encryption / Decryption 
 Encryption – 
The process of converting plain text into 
an unintelligible format (cipher text) is 
called Encryption. 
Decryption – 
The process of converting cipher text 
into a plain text is called Decryption.
 What is a Key 
 In cryptography, a key is a variable value 
that is applied using an algorithm to a string 
or block of unencrypted text to produce 
encrypted text, or to decrypt encrypted text 
 What is a Block Cipher? 
A method of encrypting / decrypting data 
Key is used for encryption / decryption. 
 What is Initialization Vector? 
An initialization vector (IV) is an arbitrary 
number that can be used along with a secret 
key for data encryption.
TYPES OF CRYPTOGRAPHIC 
ALGORITHMS 
Secret Key Cryptography (SKC) 
Public Key Cryptography (PKC) 
Hash Functions
Secret Key Cryptography 
 Encryption involves applying an 
operation (an algorithm) to the data 
to be encrypted using the private key 
to make them unintelligible. The 
slightest algorithm can make the 
system nearly tamper proof.
Public Key Cryptography 
 In a public-key encryption system, users 
choose a random key that only they 
know. From this key, they each 
automatically deduce an algorithm. 
Users exchange this public key over an 
insecure channel.
HASH FUNCTIONS 
 A cryptographic hash function is a kind 
of algorithm that can be run on a piece 
of data, often an individual file, 
producing a value called a checksum. 
 Some commonly used cryptographic 
hash functions include MD5 and SHA-1, 
though many others also exist.
DES Encryption AES Encryption 
DES uses only 56 bits key which 
provides a combination of 2^56 
combinations for encryption. 
AES can use 128, 192, 256 bits keys 
which provides 2^128, 2^192, 
2^256 combinations for 
encryption. 
DES is restricted to use a Block Size 
of only 64 bits 
AES is restricted to use a Block Size 
of 128 bits (double of what is used 
in DES) 
With 64 bits block size, the amount 
of data that can be transferred 
with a single encryption key is just 
32GB. 
With AES, it is possible to transfer 
around 256 billion GB of data. 
DES encryption is breakable 
through Brute Force attack. 
AES encryption on the other hand 
is still not breakable, though there 
are some theoretical discussions 
about breaking the AES. 
DES is an old technique used for 
encryption/decryption 
AES is relatively new.
Where to use cryptography ? 
 Anywhere you want to have something remain 
secret 
 SSL, TLS, IPv6, SSH, IPSec all keep information 
secure in transit 
 Any Symmetric Algorithm can keep your files 
safe in storage 
 You can add encryption at the application 
level, or at the server level for storing 
database information securely
Advantages 
 It hides the message and your privacy is safe. 
 No one would be able to know what it says 
unless there's a key to the code. 
 You can write what ever you want and how 
ever you want (any theme any symbol for the 
code) to keep your code a secret. 
 You are able to use cryptography during 
lessons without the teacher knowing.
Disadvantages 
 Takes a long time to figure out the code. 
 It takes long to create the code. 
 If you were to send a code to another person in the past, it 
will take long to get to that person. 
 Overall it’s a long process.
Steganography 
 The art and science of hiding information by 
embedding messages within other, 
seemingly harmless messages. 
Steganography works by replacing bits of 
useless or unused datain regular 
computer files (such as graphics, sound, 
text, HTML, or even floppy disks ) with bits of 
different, invisible information
THANK YOU

More Related Content

What's hot

Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 

What's hot (20)

Encryption
EncryptionEncryption
Encryption
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 

Viewers also liked

Basic Cryptography Overview
Basic Cryptography OverviewBasic Cryptography Overview
Basic Cryptography Overviewereddick
 
Programming & The Web & Programming the Web
Programming & The Web & Programming the WebProgramming & The Web & Programming the Web
Programming & The Web & Programming the WebVesa Vänskä
 
Security and Integrity
Security and IntegritySecurity and Integrity
Security and Integritylubna19
 
Web Tech
Web TechWeb Tech
Web TechRupsee
 
Introduction to Web Technology Stacks
Introduction to Web Technology StacksIntroduction to Web Technology Stacks
Introduction to Web Technology StacksPrakarsh -
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLSkeithrozario
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1nhepner
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityChhatra Thapa
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web TechnologyAashish Jain
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMSkoolkampus
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technologyvikram singh
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Presentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical IndustryPresentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical IndustrySathish Vemula
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 

Viewers also liked (18)

Basic Cryptography Overview
Basic Cryptography OverviewBasic Cryptography Overview
Basic Cryptography Overview
 
Programming & The Web & Programming the Web
Programming & The Web & Programming the WebProgramming & The Web & Programming the Web
Programming & The Web & Programming the Web
 
Security and Integrity
Security and IntegritySecurity and Integrity
Security and Integrity
 
Web Tech
Web TechWeb Tech
Web Tech
 
Introduction to Web Technology Stacks
Introduction to Web Technology StacksIntroduction to Web Technology Stacks
Introduction to Web Technology Stacks
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
Web technologies lesson 1
Web technologies   lesson 1Web technologies   lesson 1
Web technologies lesson 1
 
Presentation on US FDA Data Integrity Guidance.
Presentation on US FDA  Data Integrity Guidance.Presentation on US FDA  Data Integrity Guidance.
Presentation on US FDA Data Integrity Guidance.
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
6. Integrity and Security in DBMS
6. Integrity and Security in DBMS6. Integrity and Security in DBMS
6. Integrity and Security in DBMS
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technology
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Data integrity
Data integrityData integrity
Data integrity
 
Presentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical IndustryPresentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical Industry
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 

Similar to Overview of cryptography

Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Data encryption
Data encryptionData encryption
Data encryptionAman Jain
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Chapter 08
Chapter 08Chapter 08
Chapter 08cclay3
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfVAIBHAVCHAKRAWARTI
 

Similar to Overview of cryptography (20)

Asif
AsifAsif
Asif
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Data encryption
Data encryptionData encryption
Data encryption
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 

More from Roshan Chaudhary

More from Roshan Chaudhary (8)

Doubly circular linked list
Doubly circular linked listDoubly circular linked list
Doubly circular linked list
 
Doubly circular linked list
Doubly circular linked listDoubly circular linked list
Doubly circular linked list
 
Unipolar
UnipolarUnipolar
Unipolar
 
Software copyright
Software copyrightSoftware copyright
Software copyright
 
Structure and function
Structure and functionStructure and function
Structure and function
 
Effects Of ICT
Effects Of ICTEffects Of ICT
Effects Of ICT
 
Pollution and Prevention
Pollution and PreventionPollution and Prevention
Pollution and Prevention
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Overview of cryptography

  • 1. Overview of Cryptography by Roshan Chaudhary 13ITU031
  • 2. Introduction Cryptography is the practice and study of techniques for secure communication in the presence of third parties. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking.
  • 3. THE PURPOSE OF CRYPTOGRAPHY  Defending against external/internal hackers  Defending against industrial espionage  Securing E-commerce  Securing bank accounts/electronic transfers  Securing intellectual property  Avoiding liability
  • 4. Some specific security requirements  Authentication Privacy Integrity: assuring the receiver that the received message has not been altered in any way from the original.  Non-repudiation: a mechanism to prove that the sender really sent this message.
  • 5. What is Encryption / Decryption  Encryption – The process of converting plain text into an unintelligible format (cipher text) is called Encryption. Decryption – The process of converting cipher text into a plain text is called Decryption.
  • 6.  What is a Key  In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text  What is a Block Cipher? A method of encrypting / decrypting data Key is used for encryption / decryption.  What is Initialization Vector? An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • 7. TYPES OF CRYPTOGRAPHIC ALGORITHMS Secret Key Cryptography (SKC) Public Key Cryptography (PKC) Hash Functions
  • 8. Secret Key Cryptography  Encryption involves applying an operation (an algorithm) to the data to be encrypted using the private key to make them unintelligible. The slightest algorithm can make the system nearly tamper proof.
  • 9. Public Key Cryptography  In a public-key encryption system, users choose a random key that only they know. From this key, they each automatically deduce an algorithm. Users exchange this public key over an insecure channel.
  • 10. HASH FUNCTIONS  A cryptographic hash function is a kind of algorithm that can be run on a piece of data, often an individual file, producing a value called a checksum.  Some commonly used cryptographic hash functions include MD5 and SHA-1, though many others also exist.
  • 11.
  • 12. DES Encryption AES Encryption DES uses only 56 bits key which provides a combination of 2^56 combinations for encryption. AES can use 128, 192, 256 bits keys which provides 2^128, 2^192, 2^256 combinations for encryption. DES is restricted to use a Block Size of only 64 bits AES is restricted to use a Block Size of 128 bits (double of what is used in DES) With 64 bits block size, the amount of data that can be transferred with a single encryption key is just 32GB. With AES, it is possible to transfer around 256 billion GB of data. DES encryption is breakable through Brute Force attack. AES encryption on the other hand is still not breakable, though there are some theoretical discussions about breaking the AES. DES is an old technique used for encryption/decryption AES is relatively new.
  • 13. Where to use cryptography ?  Anywhere you want to have something remain secret  SSL, TLS, IPv6, SSH, IPSec all keep information secure in transit  Any Symmetric Algorithm can keep your files safe in storage  You can add encryption at the application level, or at the server level for storing database information securely
  • 14. Advantages  It hides the message and your privacy is safe.  No one would be able to know what it says unless there's a key to the code.  You can write what ever you want and how ever you want (any theme any symbol for the code) to keep your code a secret.  You are able to use cryptography during lessons without the teacher knowing.
  • 15. Disadvantages  Takes a long time to figure out the code.  It takes long to create the code.  If you were to send a code to another person in the past, it will take long to get to that person.  Overall it’s a long process.
  • 16. Steganography  The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused datain regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information