SlideShare a Scribd company logo
1 of 20
Download to read offline
Created By : Rahul Khanvani
Roll No : 47
Department Of Computer Science
Cryptography:
Securing the Information.
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
» EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?
 Does it look like nonsense to you ?
 Did you notice that I asked you the same question twice ?
 Confused ?
» Replace Each word With its Alphabet used before.
» The Cryptography is Simple 
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Cryptography is the art and science of converting ordinary information
into gibberish and converting it back to its original, meaningful form.
» Its Amazing how rotating the alphabets by even just one position is
enough to confuse human mind !
» We Call It Rotating Words.
» To convert data in meaningful form you need an algorithm ,
» you can also create your own small algorithm.
What Is Cryptography ?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» If You Say No Then I Can Say You May B Don’t Use Cryptography.
 Do You Use Gmail ?
 Do You use Facebook ?
 Have you Ever Opened a File Containing Password ?
 Did U Use HTTPS Site ?
 Do You Fill Forms on Internet ?
» Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A
Kind Of Cryptogrpahy.
 E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives.
Who Uses Cryptography ?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Plaintext – A message in its natural format readable by an attacker
» Cipher text – Message altered to be unreadable by anyone except the
intended recipients
» Key – Sequence that controls the operation and behavior of the
cryptographic algorithm
» Key-space – Total number of possible values of keys in a crypto
algorithm
» Encryption
 Plain text  Cipher text
» Decryption
 Cipher text  Plain text
Terms Used In Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Defending against external/internal hackers
» Securing E-commerce
» Securing bank accounts/electronic transfers
» Securing intellectual property
Information Security for…
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Pervasiveness of email/networks
» Online storage of sensitive information
» Insecure technologies (e.g. wireless)
» Trend towards paperless society
» Weak legal protection of email privacy.
Threats to Information Security
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
How To Send A Secure Email Or Password Protected Email?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Types Of Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Secret Writing
Steganography
Cryptography
Types of Secret Writing
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Steganography – covered writing
 – is an art of hiding information
» Popular contemporary steganography
technologies hide information in images.
Steganography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Encryption means the transformation of data by the use of
Cryptography to produce unintelligible data to ensure confidentiality
» The inverse function of encryption is called as decryption
Encryption and decryption:-
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Private (symmetric, secret) key – the same key used for
encryption/decryption
» Problem of key distribution
» How Do Both Person Agree On Same Key ?
Private Key Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Public (asymmetric) key cryptography – a public key used for encryption
and private key for decryption
» Key distribution problem solved
Public Key Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
 DES (Data Encryption Standard) and derivatives: double DES and triple DES
 IDEA (International Data Encryption Standard)
 Blowfish
 RC5 (Rivets Cipher #5)
 AES (Advance Encryption Standard)
Currently Available Crypto Algorithms (private key)
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
 RSA (Rivest, Shamir, Adleman)
 DH (Diffie-Hellman Key Agreement Algorithm)
 ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)
 RPK (Raike Public Key)
Currently Available Crypto Algorithms (public key)
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Algorithms are not theoretically unbreakable: successful attacks in the
future are possible.
» Encryption does not guarantee security!
» Many ways to beat a crypto system NOT dependent on cryptanalysis,
such as:
 Viruses, worms, hackers, etc.
 TEMPEST attacks,
 Unauthorized physical access to secret keys
» Cryptography is only one element of comprehensive computer security
How Secure are Today’s Technologies?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Thank You…
For More Visit Bnarybuzz.wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com

More Related Content

Similar to Cryptography Securing Information

Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Basic Cryptography & Security
Basic Cryptography & SecurityBasic Cryptography & Security
Basic Cryptography & SecurityHoffman Lab
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Razi Rais
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...YK Chang
 
Httpillage lascon-2015
Httpillage lascon-2015Httpillage lascon-2015
Httpillage lascon-2015forcedrequest
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...All Things Open
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in ActionJosh Sokol
 
Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.C a s e y R o s i n i
 

Similar to Cryptography Securing Information (20)

Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
Cryptography
CryptographyCryptography
Cryptography
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Basic Cryptography & Security
Basic Cryptography & SecurityBasic Cryptography & Security
Basic Cryptography & Security
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...
 
Httpillage lascon-2015
Httpillage lascon-2015Httpillage lascon-2015
Httpillage lascon-2015
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.
 

More from Rahul Khanwani

Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On GoogleRahul Khanwani
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examplesRahul Khanwani
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) modelRahul Khanwani
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algorithamRahul Khanwani
 
Data compression introduction
Data compression introductionData compression introduction
Data compression introductionRahul Khanwani
 

More from Rahul Khanwani (8)

Online examination system
Online examination systemOnline examination system
Online examination system
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On Google
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examples
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) model
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algoritham
 
Data compression introduction
Data compression introductionData compression introduction
Data compression introduction
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Google glass
Google glassGoogle glass
Google glass
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Cryptography Securing Information

  • 1. Created By : Rahul Khanvani Roll No : 47 Department Of Computer Science Cryptography: Securing the Information. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 2. Introduction Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 3. Introduction » EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?  Does it look like nonsense to you ?  Did you notice that I asked you the same question twice ?  Confused ? » Replace Each word With its Alphabet used before. » The Cryptography is Simple  Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 4. » Cryptography is the art and science of converting ordinary information into gibberish and converting it back to its original, meaningful form. » Its Amazing how rotating the alphabets by even just one position is enough to confuse human mind ! » We Call It Rotating Words. » To convert data in meaningful form you need an algorithm , » you can also create your own small algorithm. What Is Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 5. » If You Say No Then I Can Say You May B Don’t Use Cryptography.  Do You Use Gmail ?  Do You use Facebook ?  Have you Ever Opened a File Containing Password ?  Did U Use HTTPS Site ?  Do You Fill Forms on Internet ? » Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A Kind Of Cryptogrpahy.  E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives. Who Uses Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 6. » Plaintext – A message in its natural format readable by an attacker » Cipher text – Message altered to be unreadable by anyone except the intended recipients » Key – Sequence that controls the operation and behavior of the cryptographic algorithm » Key-space – Total number of possible values of keys in a crypto algorithm » Encryption  Plain text  Cipher text » Decryption  Cipher text  Plain text Terms Used In Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 7. » Defending against external/internal hackers » Securing E-commerce » Securing bank accounts/electronic transfers » Securing intellectual property Information Security for… Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 8. » Pervasiveness of email/networks » Online storage of sensitive information » Insecure technologies (e.g. wireless) » Trend towards paperless society » Weak legal protection of email privacy. Threats to Information Security Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 9. How To Send A Secure Email Or Password Protected Email? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 10. Types Of Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 11. Secret Writing Steganography Cryptography Types of Secret Writing Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 12. » Steganography – covered writing  – is an art of hiding information » Popular contemporary steganography technologies hide information in images. Steganography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 13. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 14. » Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality » The inverse function of encryption is called as decryption Encryption and decryption:- Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 15. » Private (symmetric, secret) key – the same key used for encryption/decryption » Problem of key distribution » How Do Both Person Agree On Same Key ? Private Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 16. » Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption » Key distribution problem solved Public Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 17.  DES (Data Encryption Standard) and derivatives: double DES and triple DES  IDEA (International Data Encryption Standard)  Blowfish  RC5 (Rivets Cipher #5)  AES (Advance Encryption Standard) Currently Available Crypto Algorithms (private key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 18.  RSA (Rivest, Shamir, Adleman)  DH (Diffie-Hellman Key Agreement Algorithm)  ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)  RPK (Raike Public Key) Currently Available Crypto Algorithms (public key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 19. » Algorithms are not theoretically unbreakable: successful attacks in the future are possible. » Encryption does not guarantee security! » Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:  Viruses, worms, hackers, etc.  TEMPEST attacks,  Unauthorized physical access to secret keys » Cryptography is only one element of comprehensive computer security How Secure are Today’s Technologies? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 20. Thank You… For More Visit Bnarybuzz.wordpress.com Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com