SlideShare uma empresa Scribd logo
1 de 22
Cryptography
Presented By:Sanjeev Kumar
Dept: I.T
Cryptography Intro
Why Encrypt?
• Protect stored information
• Protect from Unauthorized disclosure
Encryption - process by which plaintext is converted to cipher text using a key
Decryption - process by which cipher text is converted to plaintext (with the
appropriate key)
plaintext (clear text)- intelligible data
Cryptography Terminology
Cryptography - art/science relating to encrypting, decrypting information
Cryptanalysis - art/science relating to converting cipher text to plaintext
without the (secret) key
Here we have three types of algorithms that we can talk
about:
MODERN CRYPTOGHRAPHY
 Secret Key Cryptography
 Hash Functions
 Public Key Cryptography
MODERN CRYPTOGHRAPHY
Here we have three types of algorithms that we can talk
about:
MODERN CRYPTOGHRAPHY
 Secret Key Cryptography
 Hash Functions
 Public Key Cryptography
MODERN CRYPTOGHRAPHY
 Secret Key(Symmetric) Cryptography uses a single
key for both encryption and decryption.
SECRET KEY
CRYPTOGHRAPHY
 A single key is used
SECRET KEY
CRYPTOGHRAPHY
 Sender uses the key to encrypt
 Receiver uses the same key to decrypt
 Key must be known to both the sender and the
receiver
 The difficulty is the distribution of the key
Secret key cryptography algorithms that are in use
today :
SECRET KEY
CRYPTOGHRAPHY
 Data Encryption Standard (DES):
 Advanced Encryption Standard (AES):
 International Data Encryption Algorithm (IDEA):
SECRET KEY SUMMARY
 Hash functions(One-way cryptography) have no key
since plaintext cannot be recovered from the
ciphertext.
HASH FUNCTIONS
 Called message compiler and one-way encryption
HASH FUNCTIONS
 No key is used
 Digital fingerprint
 Provide the integrity
Hash algorithms that are in common use today:
HASH FUNCTIONS
 Message Digest (MD) algorithms:
 HAVAL (Hash of Variable Length):
 Tiger:
PUBLIC KEY CRYPTOGHRAPHY
 Public Key(Asymmetric) Cryptography. Two keys are
used. One for encryption, one for decryption.
PUBLIC KEY CRYPTOGHRAPHY
 Developed in the last 300-400 years.
 Martin Hellman and graduate student Whitfield
Diffie
 A two-key crypto system
 Mathematical functions
Public key Cryptography
Secret key Cryptography
Secret Key Cryptography
With secret key cryptography, a single key is
used for both encryption and decryption. As shown
in Figure 1A, the sender uses the key (or some set
of rules) to encrypt the plaintext and sends the
ciphertext to the receiver. The receiver applies the
same key (or ruleset) to decrypt the message and
recover the plaintext. Because a single key is used
for both functions, secret key cryptography is also
called symmetric encryption.
Secret Key Cryptography
Public-Key Cryptography
Generic PKC employs two keys that are mathematically
related although knowledge of one key does not allow
someone to easily determine the other key. One key is used to
encrypt the plaintext and the other key is used to decrypt the
ciphertext. The important point here is that it does not matter
which key is applied first, but that both keys are required for
the process to work (Figure 1B). Because a pair of keys are
required, this approach is also called asymmetric cryptography.
Public-Key Cryptography
•
THANK YOU....

Mais conteúdo relacionado

Mais procurados

Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.pptreshmy12
 
Enhanced Hybrid Encryption Algorithm
Enhanced Hybrid Encryption AlgorithmEnhanced Hybrid Encryption Algorithm
Enhanced Hybrid Encryption AlgorithmShivaditya Jatar
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom EC-Council
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singhGaurav Singh
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Adripathi Cipher
Adripathi CipherAdripathi Cipher
Adripathi CipherIJLT EMAS
 
Php text processing by softroniics
Php text processing by softroniicsPhp text processing by softroniics
Php text processing by softroniicsaswin tbbc
 

Mais procurados (20)

Cryptography
CryptographyCryptography
Cryptography
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Cryptography in Python
Cryptography in PythonCryptography in Python
Cryptography in Python
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Ppt cns
Ppt cnsPpt cns
Ppt cns
 
Enhanced Hybrid Encryption Algorithm
Enhanced Hybrid Encryption AlgorithmEnhanced Hybrid Encryption Algorithm
Enhanced Hybrid Encryption Algorithm
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography using python
Cryptography using pythonCryptography using python
Cryptography using python
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Adripathi Cipher
Adripathi CipherAdripathi Cipher
Adripathi Cipher
 
Php text processing by softroniics
Php text processing by softroniicsPhp text processing by softroniics
Php text processing by softroniics
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 

Destaque

Wild enthusiasm and project phases
Wild enthusiasm and project phasesWild enthusiasm and project phases
Wild enthusiasm and project phasesMalcolm Peart
 
Presentacion sistemas operativos
Presentacion sistemas operativosPresentacion sistemas operativos
Presentacion sistemas operativosabcd123456789abc
 
Por trás das marcas
Por trás das marcasPor trás das marcas
Por trás das marcasAlex Rocha
 
Faktor faktor yang mempengaruhi sikap wanita terhadap computer
Faktor faktor yang mempengaruhi sikap wanita terhadap computer Faktor faktor yang mempengaruhi sikap wanita terhadap computer
Faktor faktor yang mempengaruhi sikap wanita terhadap computer missng000
 
Intervento dell'arch. Marco Pisati, Studio Architettura Pisati
Intervento dell'arch. Marco Pisati, Studio Architettura PisatiIntervento dell'arch. Marco Pisati, Studio Architettura Pisati
Intervento dell'arch. Marco Pisati, Studio Architettura Pisatiinfoprogetto
 
WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013
WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013
WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013diego_gondim
 
Biografias
BiografiasBiografias
Biografiashatebey
 
Startup pitch-what ifolution
Startup pitch-what ifolutionStartup pitch-what ifolution
Startup pitch-what ifolutionCre-Aid
 
Presentacion 10 6
Presentacion 10 6Presentacion 10 6
Presentacion 10 6angerding
 
Sistema Puesta A tierra Elementos
Sistema Puesta A tierra ElementosSistema Puesta A tierra Elementos
Sistema Puesta A tierra ElementosMiguelAnr17
 
Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptualanguie17
 
LA MUSICA (PARTE DE NUESTRA VIDA)
LA MUSICA (PARTE DE NUESTRA VIDA)LA MUSICA (PARTE DE NUESTRA VIDA)
LA MUSICA (PARTE DE NUESTRA VIDA)Nay261213
 

Destaque (20)

Macedonian
MacedonianMacedonian
Macedonian
 
Wild enthusiasm and project phases
Wild enthusiasm and project phasesWild enthusiasm and project phases
Wild enthusiasm and project phases
 
Presentacion sistemas operativos
Presentacion sistemas operativosPresentacion sistemas operativos
Presentacion sistemas operativos
 
I.E.A
I.E.AI.E.A
I.E.A
 
Presentación ob
Presentación obPresentación ob
Presentación ob
 
Por trás das marcas
Por trás das marcasPor trás das marcas
Por trás das marcas
 
Faktor faktor yang mempengaruhi sikap wanita terhadap computer
Faktor faktor yang mempengaruhi sikap wanita terhadap computer Faktor faktor yang mempengaruhi sikap wanita terhadap computer
Faktor faktor yang mempengaruhi sikap wanita terhadap computer
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
Vcop
VcopVcop
Vcop
 
Intervento dell'arch. Marco Pisati, Studio Architettura Pisati
Intervento dell'arch. Marco Pisati, Studio Architettura PisatiIntervento dell'arch. Marco Pisati, Studio Architettura Pisati
Intervento dell'arch. Marco Pisati, Studio Architettura Pisati
 
WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013
WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013
WEB 3.0 - Trabalho Sistemas da Informação - FEI, 2013
 
Biografias
BiografiasBiografias
Biografias
 
Startup pitch-what ifolution
Startup pitch-what ifolutionStartup pitch-what ifolution
Startup pitch-what ifolution
 
Presentacion 10 6
Presentacion 10 6Presentacion 10 6
Presentacion 10 6
 
Sistema Puesta A tierra Elementos
Sistema Puesta A tierra ElementosSistema Puesta A tierra Elementos
Sistema Puesta A tierra Elementos
 
Kannada
KannadaKannada
Kannada
 
Lista
ListaLista
Lista
 
Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptual
 
MFA 2012 New Orleans KHA
MFA 2012 New Orleans KHAMFA 2012 New Orleans KHA
MFA 2012 New Orleans KHA
 
LA MUSICA (PARTE DE NUESTRA VIDA)
LA MUSICA (PARTE DE NUESTRA VIDA)LA MUSICA (PARTE DE NUESTRA VIDA)
LA MUSICA (PARTE DE NUESTRA VIDA)
 

Semelhante a Er. Sanjeev Raaz

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptPayalChopra9
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptvinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.pptso6281019
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 

Semelhante a Er. Sanjeev Raaz (20)

Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Data encryption
Data encryptionData encryption
Data encryption
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Unit 2
Unit 2Unit 2
Unit 2
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography
CryptographyCryptography
Cryptography
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Unit 1
Unit 1Unit 1
Unit 1
 
Asif
AsifAsif
Asif
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 

Último

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Último (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Er. Sanjeev Raaz

  • 2. Cryptography Intro Why Encrypt? • Protect stored information • Protect from Unauthorized disclosure Encryption - process by which plaintext is converted to cipher text using a key Decryption - process by which cipher text is converted to plaintext (with the appropriate key) plaintext (clear text)- intelligible data
  • 3. Cryptography Terminology Cryptography - art/science relating to encrypting, decrypting information Cryptanalysis - art/science relating to converting cipher text to plaintext without the (secret) key
  • 4. Here we have three types of algorithms that we can talk about: MODERN CRYPTOGHRAPHY  Secret Key Cryptography  Hash Functions  Public Key Cryptography
  • 6. Here we have three types of algorithms that we can talk about: MODERN CRYPTOGHRAPHY  Secret Key Cryptography  Hash Functions  Public Key Cryptography
  • 8.  Secret Key(Symmetric) Cryptography uses a single key for both encryption and decryption. SECRET KEY CRYPTOGHRAPHY
  • 9.  A single key is used SECRET KEY CRYPTOGHRAPHY  Sender uses the key to encrypt  Receiver uses the same key to decrypt  Key must be known to both the sender and the receiver  The difficulty is the distribution of the key
  • 10. Secret key cryptography algorithms that are in use today : SECRET KEY CRYPTOGHRAPHY  Data Encryption Standard (DES):  Advanced Encryption Standard (AES):  International Data Encryption Algorithm (IDEA):
  • 12.  Hash functions(One-way cryptography) have no key since plaintext cannot be recovered from the ciphertext. HASH FUNCTIONS
  • 13.  Called message compiler and one-way encryption HASH FUNCTIONS  No key is used  Digital fingerprint  Provide the integrity
  • 14. Hash algorithms that are in common use today: HASH FUNCTIONS  Message Digest (MD) algorithms:  HAVAL (Hash of Variable Length):  Tiger:
  • 15. PUBLIC KEY CRYPTOGHRAPHY  Public Key(Asymmetric) Cryptography. Two keys are used. One for encryption, one for decryption.
  • 16. PUBLIC KEY CRYPTOGHRAPHY  Developed in the last 300-400 years.  Martin Hellman and graduate student Whitfield Diffie  A two-key crypto system  Mathematical functions
  • 17. Public key Cryptography Secret key Cryptography
  • 18. Secret Key Cryptography With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.
  • 20. Public-Key Cryptography Generic PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. The important point here is that it does not matter which key is applied first, but that both keys are required for the process to work (Figure 1B). Because a pair of keys are required, this approach is also called asymmetric cryptography.