SlideShare a Scribd company logo
1 of 22
CRYPOGRAPHY
ENCRYPTION and
DECRYPTION
Some Basic Terms
 Plain Text/Clear Text :Data that can be read and
  understood without any special measure.
 Cipher Text :The unreadable plain text after
  encryption.
 Encryption :The method of disguising to hide its
  substance.
 Decryption :The method of reverting cipher text to
  its original plain text.
CRYPTANALYSIS vs. CRYPTOGRAPHY?
 Cryptography is a science of using mathematics to
  encrypt and decrypt data. It enable us to store and
  transmit sensitive data over unsecure network.
 Cryptanalysis is the science of analyzing and breaking
  secure communication.
CONVENTIONAL CRYPTOGRAPHY
 In conventional cryptography(symmetric key
  encryption)one key is used both for encryption and
  decryption.
 i.e. Caesar’s cipher
 This cryptography is very fast but is quite expensive
  due to difficulty of secure key distribution.
PUBLIC KEY CRYPTOGRAPHY
 It uses two key, one key for encryption(public key) and
  one for decryption(private key).
 We publish the data with the public key to the world
  while keeping the private key.
 The need for sender and receiver to share secret key
  via some secure channel is eliminated.
HYBRID CRYPTOGRAPHY
Combines strengths of both methods
Asymmetric distributes symmetric key.
 Also known as a session key(one time
 only secret key).
 Symmetric provides bulk encryption
i.e. PGP
KEYS
 Work with cryptographic algorithm to produce a
  specific cipher text.
 Larger keys are secure for longer period of time.
STEGANOGRAPHY
 Greek for “covered writing”


 “The art and science of writing hidden messages in
  such a way that no one apart from the intended
  recipient even knows that a message has been sent.”
 It makes use of seemingly innocent cover files such as
  text, audio, and image files
IMAGE BASED TECHNIQUE
 Least Significant Bit Insertion
 Replaces the LSB with the message to be encoded.
 Simple, but susceptible to lossy compression and
  image manipulation
 Masking and Filtering
 Masks secret data over the original data by changing
  the luminance of particular areas
 During masking, it embed the message within
  significant bits of the cover image
 Digital Watermarking – provides identification
 pertaining to the owner; i.e. license or copyright
 information
 - Invisible vs. Visible

 Fingerprinting – provides identification of the user;
 used to identify and track illegal use of content
WATERMARK
WEB HOSTING
 A web hosting is a type of Internet hosting that allows
 individuals and organizations to make their website
 accessible via the World Wide Web or locally in the
 network.

 The most basic is web page and small-scale file
 hosting, where files can be uploaded via File Transfer
 Protocol (FTP) on the server.
DNS
 A Domain Name Service translates queries for domain
 names (which are easier to understand and utilize
 when accessing the internet) into IP addresses for the
 purpose of locating computer services and devices
 worldwide.

 For example, the domain name
 www.ethicalpirates.com translates to the addresses
 172.16.32.254 (IPv4).
APACHE (Web Server)


 Web servers are computers that deliver (serves up)
 Web pages. Every Web server has an IP address and
 possibly a domain name.

 Any computer can be turned into a Web server by
 installing server software and connecting the machine
 to the internet
FIREWALL
 A firewall is a rule or set of rules create to permit or
  deny network transmissions based on a set of rules and
  is frequently used to protect networks from
  unauthorized access while permitting legitimate
  communications to pass.

 Firewalls are frequently used to prevent unauthorized
  Internet users from accessing private networks
  connected to the Internet, especially intranets.
 i.e. Packet Filter, Proxy Server etc.
REFERENCES
 www.jjtc.com/stegdoc/steg1995.html
 “Information Hiding: Techniques for Steganography
  and Digital Watermarking” – S. Katzenbeisser, F. Petit
  colas
 “RSA Security’s Official Guide to Cryptography” by S.
  Burnett and S. Paine, Osborne/McGraw-Hill, 2001
 The Code Breaker-David Khan

More Related Content

What's hot

How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storageLeMeniz Infotech
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storageLeMeniz Infotech
 

What's hot (17)

Week13
Week13Week13
Week13
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Encryption
EncryptionEncryption
Encryption
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
s117
s117s117
s117
 
Week13
Week13Week13
Week13
 
Cryptography
CryptographyCryptography
Cryptography
 
Week13
Week13Week13
Week13
 
Week11
Week11Week11
Week11
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 
Steganography
SteganographySteganography
Steganography
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Week13
Week13Week13
Week13
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 

Viewers also liked

Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processingAshish Kumar
 
02 psychovisual perception DIP
02 psychovisual perception DIP02 psychovisual perception DIP
02 psychovisual perception DIPbabak danyal
 
04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIPbabak danyal
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using PythonKarim Sonbol
 
07 frequency domain DIP
07 frequency domain DIP07 frequency domain DIP
07 frequency domain DIPbabak danyal
 
Image processing spatialfiltering
Image processing spatialfilteringImage processing spatialfiltering
Image processing spatialfilteringJohn Williams
 
01 introduction DIP
01 introduction DIP01 introduction DIP
01 introduction DIPbabak danyal
 
Digitized images and
Digitized images andDigitized images and
Digitized images andAshish Kumar
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2Gichelle Amon
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1Gichelle Amon
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processingAsad Ali
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Image pre processing-restoration
Image pre processing-restorationImage pre processing-restoration
Image pre processing-restorationAshish Kumar
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIPbabak danyal
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domainAshish Kumar
 
05 histogram processing DIP
05 histogram processing DIP05 histogram processing DIP
05 histogram processing DIPbabak danyal
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIPbabak danyal
 
10 color image processing
10 color image processing10 color image processing
10 color image processingbabak danyal
 
Image enhancement
Image enhancementImage enhancement
Image enhancementAyaelshiwi
 

Viewers also liked (20)

Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processing
 
02 psychovisual perception DIP
02 psychovisual perception DIP02 psychovisual perception DIP
02 psychovisual perception DIP
 
04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP04 image enhancement in spatial domain DIP
04 image enhancement in spatial domain DIP
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using Python
 
07 frequency domain DIP
07 frequency domain DIP07 frequency domain DIP
07 frequency domain DIP
 
Image processing spatialfiltering
Image processing spatialfilteringImage processing spatialfiltering
Image processing spatialfiltering
 
01 introduction DIP
01 introduction DIP01 introduction DIP
01 introduction DIP
 
applist
applistapplist
applist
 
Digitized images and
Digitized images andDigitized images and
Digitized images and
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processing
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Image pre processing-restoration
Image pre processing-restorationImage pre processing-restoration
Image pre processing-restoration
 
06 spatial filtering DIP
06 spatial filtering DIP06 spatial filtering DIP
06 spatial filtering DIP
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domain
 
05 histogram processing DIP
05 histogram processing DIP05 histogram processing DIP
05 histogram processing DIP
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIP
 
10 color image processing
10 color image processing10 color image processing
10 color image processing
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 

Similar to online game over cryptography

Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
Chapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thChapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thJinElias52
 
Chapter 08
Chapter 08Chapter 08
Chapter 08cclay3
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptxabbu03oct
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12s1190091
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)rosu555
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 
Frsa
FrsaFrsa
Frsa_111
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 

Similar to online game over cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Chapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thChapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of th
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
cryptography
cryptographycryptography
cryptography
 
Frsa
FrsaFrsa
Frsa
 
Network security
Network securityNetwork security
Network security
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
Cryptography
CryptographyCryptography
Cryptography
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 

More from Ashish Kumar

Computer architecture
Computer architecture Computer architecture
Computer architecture Ashish Kumar
 
Introduction vision
Introduction visionIntroduction vision
Introduction visionAshish Kumar
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processingAshish Kumar
 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 
process management
 process management process management
process managementAshish Kumar
 
resource management
  resource management  resource management
resource managementAshish Kumar
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
video compression techique
video compression techiquevideo compression techique
video compression techiqueAshish Kumar
 

More from Ashish Kumar (20)

Computer architecture
Computer architecture Computer architecture
Computer architecture
 
Lecture2 color
Lecture2 colorLecture2 color
Lecture2 color
 
Introduction vision
Introduction visionIntroduction vision
Introduction vision
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processing
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
Data structures
Data structuresData structures
Data structures
 
Lecture2 light
Lecture2 lightLecture2 light
Lecture2 light
 
process management
 process management process management
process management
 
resource management
  resource management  resource management
resource management
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
message passing
 message passing message passing
message passing
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
color
colorcolor
color
 
system design
system designsystem design
system design
 
video compression techique
video compression techiquevideo compression techique
video compression techique
 
Compression
CompressionCompression
Compression
 
1.animation
1.animation1.animation
1.animation
 
MHEG
MHEGMHEG
MHEG
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

online game over cryptography

  • 3. Some Basic Terms  Plain Text/Clear Text :Data that can be read and understood without any special measure.  Cipher Text :The unreadable plain text after encryption.  Encryption :The method of disguising to hide its substance.  Decryption :The method of reverting cipher text to its original plain text.
  • 4. CRYPTANALYSIS vs. CRYPTOGRAPHY?  Cryptography is a science of using mathematics to encrypt and decrypt data. It enable us to store and transmit sensitive data over unsecure network.  Cryptanalysis is the science of analyzing and breaking secure communication.
  • 6.  In conventional cryptography(symmetric key encryption)one key is used both for encryption and decryption.  i.e. Caesar’s cipher  This cryptography is very fast but is quite expensive due to difficulty of secure key distribution.
  • 8.  It uses two key, one key for encryption(public key) and one for decryption(private key).  We publish the data with the public key to the world while keeping the private key.  The need for sender and receiver to share secret key via some secure channel is eliminated.
  • 10. Combines strengths of both methods Asymmetric distributes symmetric key.  Also known as a session key(one time only secret key).  Symmetric provides bulk encryption i.e. PGP
  • 11. KEYS  Work with cryptographic algorithm to produce a specific cipher text.  Larger keys are secure for longer period of time.
  • 12. STEGANOGRAPHY  Greek for “covered writing”  “The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  It makes use of seemingly innocent cover files such as text, audio, and image files
  • 13. IMAGE BASED TECHNIQUE  Least Significant Bit Insertion  Replaces the LSB with the message to be encoded.  Simple, but susceptible to lossy compression and image manipulation  Masking and Filtering  Masks secret data over the original data by changing the luminance of particular areas  During masking, it embed the message within significant bits of the cover image
  • 14.  Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs. Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 17.  A web hosting is a type of Internet hosting that allows individuals and organizations to make their website accessible via the World Wide Web or locally in the network.  The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) on the server.
  • 18. DNS  A Domain Name Service translates queries for domain names (which are easier to understand and utilize when accessing the internet) into IP addresses for the purpose of locating computer services and devices worldwide.  For example, the domain name www.ethicalpirates.com translates to the addresses 172.16.32.254 (IPv4).
  • 19. APACHE (Web Server)  Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name.  Any computer can be turned into a Web server by installing server software and connecting the machine to the internet
  • 21.  A firewall is a rule or set of rules create to permit or deny network transmissions based on a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.  Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.  i.e. Packet Filter, Proxy Server etc.
  • 22. REFERENCES  www.jjtc.com/stegdoc/steg1995.html  “Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petit colas  “RSA Security’s Official Guide to Cryptography” by S. Burnett and S. Paine, Osborne/McGraw-Hill, 2001  The Code Breaker-David Khan