SlideShare uma empresa Scribd logo
1 de 18
Cryptography




Presented To:-           Presented By:-
Mr. Anurag Sharma   Rohan Jain , CS B ,
1000210077
Overview
•   Cryptography………………..……….An introduction
•   Objectives………………………………….Brief Aspect
•   Terminology……………..…..To Make You Familiar
•   How………………….…………………….Demonstration
•   Methods………………………….......Public & Private
•   Implementation………………..Hashing Algorithm
•   Cryptography in Networking Security………....…
•   Applications……………………………Real Life Scope
Introduction
 The Word Cryptology is made up of “Kryptos", which means
  hidden and “Logos" which means word.
 In Laymen Words, it is an Art and science of protecting data.
 Technically, It involves logical transformation of information.
 The Principles of Cryptography are today applied to the
  encryption of fax ,television, and computer network
  communications and many other fields.
 Since the secure exchange of computer data is of great
  importance to banking, government, and commercial
  communications as well as for individuals.
Objectives
1)Confidentiality :-The information cannot be understood by
anyone for whom it was unintended.

2) Integrity :-The information cannot be altered in storage or
transit between sender and intended receiver without the
alteration being detected. (Data Is Not Corrupted).

3)Non-repudiation :-The creator/sender of the information
cannot deny at a later stage his or her intentions in the
creation or transmission of the information.

4) Authentication :-The sender and receiver can confirm each
other’s identity and the origin/destination of the information.
(Source Of Data IS Genuine).
Terminology
R   O         H          A       N         J        A            I        N
                                                                                  Plain Text(Can
                                                                              Be Variable Length)


                       Encryption Using Key                                    Using Algorithms
                                                                          (MD4,MD5,SHA-1,RSA)

                                                                                    Cipher Text
    00   B8       3c     Ef   G0 Xh        99   3d      2f



                                                                     Using Algorithm (Same As
                  Decryption Using Same                              Used To Encrypt the Text)
                           Keys


R   O         H          A      N      J        A            I        N
HOW…??
A Simple Demonstration:-Substitution Cipher
To Encode:-> S          E     C     R    E     T
Key :-> Offset the 3rd letter so the alphabets begin with it.
         So starting with:-
                           ABCDEFGHIJKLMNOPQRSTUVWXYZ
         and sliding everything by 3, we get:-
                           DEFGHIJKLMNOPQRSTUVWXYZABC
         So D=A, E=B, F=C…..and so on.
Encoded:-> V      H     F     U       H          W

To Decode:-> Provide anyone the key i.e.,
              =>Offset the 3rd letter so the alphabets begin with it.
Cryptography Methods : Modern
           Cryptography
o Symmetric-Key Cryptography.
o Asymmetric-Key Cryptography.
o Cryptanalysis.
Private(Symmetric) Cryptography
In symmetric-key encryption each end already has a secret key
(code) that it can use to encrypt a packet of information before it
is sent over the network to another computer.
Private Cryptography Methods:-
DES (Data Encryption Standard)               AES(Advanced Encryption Standard)

Older                                        Newer

Breakable                                    Unbreakable

Smaller Key (56-bit Encryption).             Bigger Key(128/192bit /256 bit Encryption).

7*10^16 Key Combinations.                    3*10^35 Key Combinations.

Smaller Block Size (64 bits).                Larger Block Size (128bits).

For DES with 64 bits, the maximum amount For AES with 128 bits, the maximum
of data that can be transferred with a single amount of data that can be transferred
encryption key is 32GB.                       with a single encryption key is 256 EB.
Public/Asymmetric Cryptography
Asymmetric/Public encryption uses two different keys at once
i.e., combination of a private key and a public key. The private
key is known only to your computer while the public key is
given by your computer to any computer that wants to
communicate securely with it.
 To decode an
encrypted Message a
computer must use the
public key provided by
originating computer,
and its own private key
Cryptanalysis
   The Study of methods to break Cryptosystems.
   Often targeted at obtaining a key.
   Cryptanalysis Attacks:-
o   Brute force
    o Trying all key values in the keyspace.
o Frequency Analysis
    o Guess values based on frequency of occurrence.
o Dictionary Attack
    o Find plaintext based on common words.
Implementation of Encryption Keys
             :Hash Function
A hash function is any algorithm or subroutine that maps large
data sets of variable length to smaller data sets of a fixed
length. For example, a person's name, having a variable
length, could be hashed to a single integer.
Basic Idea:-
Input Number                                     10,667
Hashing Function                          Input# x 143
Hash Value                                1,525,381

Public keys generally use more complex algorithms and very
large hash values for encrypting, including 40-bit or even 128-
bit numbers. A 128-bit number has a possible 2128.
• The values returned by a hash function are called hash
  values, hash codes, digest ,hash sums, checksums or
  simply hashes.
• A Cryptographic hash function (specifically, SHA-1) at work.
  Note that even small changes in the source input (here in
  the word "over") drastically change the resulting output.
               V
                   U
Cryptography in Networking
 Transport Layer Security (TLS) and its predecessor, Secure
  Sockets Layer (SSL), are cryptographic protocols that
  provide communication security over the Internet.
 Several versions of the protocols are in widespread use in
  applications such as web browsing, electronic mail, Internet
  faxing, instant messaging and voice-over-IP (VoIP).
 When you're accessing sensitive information, such as an
  online bank account or a payment transfer service like PayPal
  or Google Checkout.
The client request the SSL connection by sending the request.
Server provides it’s secure certificate to client to show it’s
authenticity.
Client validates the certificate and request a one time session
with server.
Server completes the SSL handshake and the session begins.
Applications

•   ATM Cards
•   E-Commerce
•   Computer Passwords
•   Electronic Fund Transfer
•   Digital Signatures
•   Network Security
•   Storage Integrity
References
    http://en.wikipedia.org/wiki/Cryptography

http://en.wikipedia.org/wiki/Cryptographic_hash
                    function

http://computer.howstuffworks.com/encryption.ht
                      m

http://en.wikipedia.org/wiki/Secure_Sockets_Layer
Queries ??

Mais conteúdo relacionado

Mais procurados

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHPEnrico Zimuel
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communicationMohd Arif
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3koolkampus
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functionsDr.Florence Dayana
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & CryptographyDr. Himanshu Gupta
 

Mais procurados (20)

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Itt project
Itt projectItt project
Itt project
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Strong cryptography in PHP
Strong cryptography in PHPStrong cryptography in PHP
Strong cryptography in PHP
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 

Semelhante a Cryptography

Semelhante a Cryptography (20)

Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
 
Day5
Day5Day5
Day5
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Moein
MoeinMoein
Moein
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Último (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Cryptography

  • 1. Cryptography Presented To:- Presented By:- Mr. Anurag Sharma Rohan Jain , CS B , 1000210077
  • 2. Overview • Cryptography………………..……….An introduction • Objectives………………………………….Brief Aspect • Terminology……………..…..To Make You Familiar • How………………….…………………….Demonstration • Methods………………………….......Public & Private • Implementation………………..Hashing Algorithm • Cryptography in Networking Security………....… • Applications……………………………Real Life Scope
  • 3. Introduction  The Word Cryptology is made up of “Kryptos", which means hidden and “Logos" which means word.  In Laymen Words, it is an Art and science of protecting data.  Technically, It involves logical transformation of information.  The Principles of Cryptography are today applied to the encryption of fax ,television, and computer network communications and many other fields.  Since the secure exchange of computer data is of great importance to banking, government, and commercial communications as well as for individuals.
  • 4. Objectives 1)Confidentiality :-The information cannot be understood by anyone for whom it was unintended. 2) Integrity :-The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. (Data Is Not Corrupted). 3)Non-repudiation :-The creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information. 4) Authentication :-The sender and receiver can confirm each other’s identity and the origin/destination of the information. (Source Of Data IS Genuine).
  • 5. Terminology R O H A N J A I N Plain Text(Can Be Variable Length) Encryption Using Key Using Algorithms (MD4,MD5,SHA-1,RSA) Cipher Text 00 B8 3c Ef G0 Xh 99 3d 2f Using Algorithm (Same As Decryption Using Same Used To Encrypt the Text) Keys R O H A N J A I N
  • 6. HOW…?? A Simple Demonstration:-Substitution Cipher To Encode:-> S E C R E T Key :-> Offset the 3rd letter so the alphabets begin with it. So starting with:- ABCDEFGHIJKLMNOPQRSTUVWXYZ and sliding everything by 3, we get:- DEFGHIJKLMNOPQRSTUVWXYZABC So D=A, E=B, F=C…..and so on. Encoded:-> V H F U H W To Decode:-> Provide anyone the key i.e., =>Offset the 3rd letter so the alphabets begin with it.
  • 7. Cryptography Methods : Modern Cryptography o Symmetric-Key Cryptography. o Asymmetric-Key Cryptography. o Cryptanalysis.
  • 8. Private(Symmetric) Cryptography In symmetric-key encryption each end already has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer.
  • 9. Private Cryptography Methods:- DES (Data Encryption Standard) AES(Advanced Encryption Standard) Older Newer Breakable Unbreakable Smaller Key (56-bit Encryption). Bigger Key(128/192bit /256 bit Encryption). 7*10^16 Key Combinations. 3*10^35 Key Combinations. Smaller Block Size (64 bits). Larger Block Size (128bits). For DES with 64 bits, the maximum amount For AES with 128 bits, the maximum of data that can be transferred with a single amount of data that can be transferred encryption key is 32GB. with a single encryption key is 256 EB.
  • 10. Public/Asymmetric Cryptography Asymmetric/Public encryption uses two different keys at once i.e., combination of a private key and a public key. The private key is known only to your computer while the public key is given by your computer to any computer that wants to communicate securely with it.  To decode an encrypted Message a computer must use the public key provided by originating computer, and its own private key
  • 11. Cryptanalysis  The Study of methods to break Cryptosystems.  Often targeted at obtaining a key.  Cryptanalysis Attacks:- o Brute force o Trying all key values in the keyspace. o Frequency Analysis o Guess values based on frequency of occurrence. o Dictionary Attack o Find plaintext based on common words.
  • 12. Implementation of Encryption Keys :Hash Function A hash function is any algorithm or subroutine that maps large data sets of variable length to smaller data sets of a fixed length. For example, a person's name, having a variable length, could be hashed to a single integer. Basic Idea:- Input Number 10,667 Hashing Function Input# x 143 Hash Value 1,525,381 Public keys generally use more complex algorithms and very large hash values for encrypting, including 40-bit or even 128- bit numbers. A 128-bit number has a possible 2128.
  • 13. • The values returned by a hash function are called hash values, hash codes, digest ,hash sums, checksums or simply hashes. • A Cryptographic hash function (specifically, SHA-1) at work. Note that even small changes in the source input (here in the word "over") drastically change the resulting output. V U
  • 14. Cryptography in Networking  Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.  Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).  When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout.
  • 15. The client request the SSL connection by sending the request. Server provides it’s secure certificate to client to show it’s authenticity. Client validates the certificate and request a one time session with server. Server completes the SSL handshake and the session begins.
  • 16. Applications • ATM Cards • E-Commerce • Computer Passwords • Electronic Fund Transfer • Digital Signatures • Network Security • Storage Integrity
  • 17. References http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Cryptographic_hash function http://computer.howstuffworks.com/encryption.ht m http://en.wikipedia.org/wiki/Secure_Sockets_Layer