SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
CRYPTOGRAPHY,[object Object],Presented By:,[object Object],Niharjyoti Sarangi (06/232),[object Object],Sukant Kumar Bishi (06/231),[object Object]
Cryptography :,[object Object],The word “Cryptography”  is derived from Greek words κρυπτόςkryptós meaning “hidden” and γράφωgráfo meaning “to write”. ,[object Object],Cryptography is the practice and study of hiding information.,[object Object],It is considered as a branch of both Mathematics and Computer Science.,[object Object]
A Brief History of Cryptography :,[object Object],Probable  origin of cryptography : 2000 B.C.  In Egypt. (Hieroglyphics).,[object Object]
A Brief History of Cryptography (contd.) :,[object Object],The ancient Chinese art of Cryptography: Ideography.,[object Object],Petroglyph (An Ideograph on rock surface),[object Object]
A Brief History of Cryptography (contd.) :,[object Object],The ancient art of Cryptography in Mesopotamia, Babylon, Assyria: Cuneiforms and Atbash ciphers.,[object Object]
A Brief History of Cryptography (contd.) :,[object Object],Spartan art of Cryptography : A system which consisted of a thin sheet of papyrus wrapped around a staff. ,[object Object],[object Object],[object Object]
A Brief History of Cryptography (contd.) :,[object Object]
A Brief History of Cryptography (contd.) :,[object Object],Polybius Squares: ,[object Object]
A Brief History of Cryptography (contd.) :,[object Object],Caesar Cipher: ,[object Object],Monoalphabetic Substitution,[object Object]
A Brief History of Cryptography (contd.) :,[object Object],Polyalphabetic  Substitution:,[object Object],[object Object]
Uses two concentric discs with letters written on both of them.,[object Object]
Wrote this in his book “Tracte des Chiffres”.,[object Object]
Elements of Cryptography:,[object Object],Encryption,[object Object],Decryption,[object Object],Key,[object Object]
Encryption and Decryption,[object Object],The process of disguising a message in such a way as to hide its substance is encryption.,[object Object],An encrypted message is cipher text.,[object Object],The process of turning cipher text back into plaintext is decryption.,[object Object],Plain Text,[object Object],Cipher Text,[object Object],Plain Text,[object Object],Encryption,[object Object],Decryption,[object Object]
Key:,[object Object],A key is a value that works with a cryptographic algorithm to produce a specific cipher text.,[object Object]
Types of Cryptography:,[object Object],Based on the type of key used, Cryptography is broadly categorized into:,[object Object],Symmetric Key Cryptography,[object Object],Asymmetric Key Cryptography,[object Object]
Symmetric key Cryptography:,[object Object]
DES(Data Encryption Standard):,[object Object]
Asymmetric key Cryptography:,[object Object],[object Object],[object Object]
RSA Algorithm (Contd.):,[object Object]
RSA Algorithm (contd.):,[object Object],Key Generation,[object Object]
RSA Algorithm (contd.):,[object Object],Encryption,[object Object],Decryption,[object Object]
Diffie-Hellman Key Exchange:,[object Object]
Applications of Cryptography:,[object Object],ISDN,[object Object],Kerberos,[object Object],Kryptoknight,[object Object],Sesame,[object Object],PEM,[object Object],PGP,[object Object],Smart Cards,[object Object],UEPS,[object Object],Clipper Chip (MYK-78T),[object Object],Cap Stone (MYK-80),[object Object]
Thank You,[object Object],Niharjyoti Sarangi,[object Object],Sukant Kumar Bishi,[object Object]
Cryptography
Cryptography

Mais conteúdo relacionado

Mais procurados

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Cryptography
CryptographyCryptography
Cryptographyprasham95
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 

Mais procurados (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Semelhante a Cryptography

A Survey On Cryptography And Steganography Methods For Information Security
A Survey On Cryptography And Steganography Methods For Information SecurityA Survey On Cryptography And Steganography Methods For Information Security
A Survey On Cryptography And Steganography Methods For Information SecurityJennifer Daniel
 
Ciphertext(usman 57, humza-34)
Ciphertext(usman 57, humza-34)Ciphertext(usman 57, humza-34)
Ciphertext(usman 57, humza-34)Usman Ahmed
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Cryptography_dontefrancis
Cryptography_dontefrancisCryptography_dontefrancis
Cryptography_dontefrancisDonte Francis
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Lesson 1 presentation
Lesson 1 presentationLesson 1 presentation
Lesson 1 presentation4011cassandra
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Anas Rock
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTAlexander Kolybelnikov
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityBikramjit Sarkar, Ph.D.
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Yekini Nureni
 

Semelhante a Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
A Survey On Cryptography And Steganography Methods For Information Security
A Survey On Cryptography And Steganography Methods For Information SecurityA Survey On Cryptography And Steganography Methods For Information Security
A Survey On Cryptography And Steganography Methods For Information Security
 
Ciphertext(usman 57, humza-34)
Ciphertext(usman 57, humza-34)Ciphertext(usman 57, humza-34)
Ciphertext(usman 57, humza-34)
 
Crypto
CryptoCrypto
Crypto
 
History of Cryptography
History of CryptographyHistory of Cryptography
History of Cryptography
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Cryptography_dontefrancis
Cryptography_dontefrancisCryptography_dontefrancis
Cryptography_dontefrancis
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Lesson 1 presentation
Lesson 1 presentationLesson 1 presentation
Lesson 1 presentation
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )Information Security Cryptography ( L03- Old Cryptography Algorithms )
Information Security Cryptography ( L03- Old Cryptography Algorithms )
 
Seminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPTSeminar no.1 Information security for 4th course MIPT
Seminar no.1 Information security for 4th course MIPT
 
Edward Schaefer
Edward SchaeferEdward Schaefer
Edward Schaefer
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
Draft 6
Draft 6Draft 6
Draft 6
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
 

Último

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Último (20)

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

Cryptography

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.