SlideShare uma empresa Scribd logo
1 de 24
‘’ The Science of encrypTion ’’
•   What is cryptography ?


•   Why cryptography is important ?
Contents
•   The purpose of cryptography
•   History of cryptography and cryptanalysis
•   Modern cryptography(Types of Algorithms)
     - Secret Key Cryptography
     - Hash Functions
     - Public Key Cryptography
     - Why Three Encryption Techniques?
     - The Significance of Passwords & Password Security
•   Conclusion
THE PURPOSE OF CRYPTOGRAPHY
Specific security requirements for communication:
  Data transfer and telecommunication
  Science of communications code
  Computer writing in secret

 Authentication:
 Privacy/confidentiality:
 Integrity:
 Non-repudiation:
HISTORY OF CRYPTOGRAPHY
The history of cryptography can be divided into two
parts:

(1) From ancient civilizations to the 19th century and the
first part of the 20th century,


(2) Use of encrypting electro-mechanical
machines, around the period of the WW II.
HISTORY OF CRYPTOGRAPHY
Cryptography was used in three kinds of contexts in
Cryptography::
ancient times

 Private communications
Greek κρυπτός, kryptos,

 Art and religion
"hidden, secret"

 Military and diplomatic use
MODERN CRYPTOGHRAPHY
Here we have three types of algorithms that we can
talk about:

 Secret Key Cryptography

 Hash Functions

 Public Key Cryptography
MODERN CRYPTOGHRAPHY
SECRET KEY CRYPTOGHRAPHY




 Secret Key(Symmetric) Cryptography uses a single
  key for both encryption and decryption.
SECRET KEY CRYPTOGHRAPHY
 A single key is used

 Sender uses the key to encrypt

 Receiver uses the same key to decrypt

 Key must be known to both the sender and the
  receiver

 The difficulty is the distribution of the key
SECRET KEY CRYPTOGHRAPHY
Secret key cryptography algorithms that are in use
today :
 Data Encryption Standard (DES):

 Advanced Encryption Standard (AES):


 International Data Encryption Algorithm (IDEA):
SECRET KEY SUMMARY
HASH FUNCTIONS




 Hash functions(One-way cryptography) have no
  key since plaintext cannot be recovered from the
  ciphertext.
HASH FUNCTIONS
 Called message compiler and one-way encryption

 No key is used

 Digital fingerprint

 Provide the integrity
HASH FUNCTIONS

Hash algorithms that are in common use today:

 Message Digest (MD) algorithms:

 HAVAL (Hash of Variable Length):


 Tiger:
PUBLIC KEY CRYPTOGHRAPHY




 Public Key(Asymmetric) Cryptography. Two keys are
  used. One for encryption, one for decryption.
PUBLIC KEY CRYPTOGHRAPHY
 Developed in the last 300-400 years.

 Martin Hellman and graduate student Whitfield
  Diffie
 A two-key crypto system

 Mathematical functions
PUBLIC KEY CRYPTOGHRAPHY
Mathematical Functions :

 Multiplication vs. factorization:


 Exponentiation vs. logarithms:
PUBLIC KEY CRYPTOGHRAPHY
PUBLIC KEY SUMMARY
Why Three Encryption Techniques?

 Why are there so many different types of
  cryptographic schemes?


 Why can't we do everything we need with just
  one ?
THE SIGNIFICANCE OF PASSWORDS

 Every password can be decyrpted.

 In cryptography, size does matter.
How to create & use strong
        Passwords
How to create & use strong
           Passwords
 Use lengthy passwords.
         THANK YOU symbols.
 Combine letters, numbers, and
 FOR LISTENING TO US (:
 Use words and phrases.

Mais conteúdo relacionado

Mais procurados

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 

Mais procurados (20)

cryptography
cryptographycryptography
cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Cryptography
CryptographyCryptography
Cryptography
 

Destaque

Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 

Destaque (20)

Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mir
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Cryptography
CryptographyCryptography
Cryptography
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
 
Cryptography
CryptographyCryptography
Cryptography
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 

Semelhante a Cryptography

PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 

Semelhante a Cryptography (20)

Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Er. Sanjeev Raaz
Er. Sanjeev RaazEr. Sanjeev Raaz
Er. Sanjeev Raaz
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Lecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptxLecture 5 - Cryptography.pptx
Lecture 5 - Cryptography.pptx
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Asif
AsifAsif
Asif
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 

Último

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Cryptography

  • 1. ‘’ The Science of encrypTion ’’
  • 2. What is cryptography ? • Why cryptography is important ?
  • 3. Contents • The purpose of cryptography • History of cryptography and cryptanalysis • Modern cryptography(Types of Algorithms) - Secret Key Cryptography - Hash Functions - Public Key Cryptography - Why Three Encryption Techniques? - The Significance of Passwords & Password Security • Conclusion
  • 4. THE PURPOSE OF CRYPTOGRAPHY Specific security requirements for communication: Data transfer and telecommunication Science of communications code Computer writing in secret  Authentication:  Privacy/confidentiality:  Integrity:  Non-repudiation:
  • 5. HISTORY OF CRYPTOGRAPHY The history of cryptography can be divided into two parts: (1) From ancient civilizations to the 19th century and the first part of the 20th century, (2) Use of encrypting electro-mechanical machines, around the period of the WW II.
  • 6. HISTORY OF CRYPTOGRAPHY Cryptography was used in three kinds of contexts in Cryptography:: ancient times  Private communications Greek κρυπτός, kryptos,  Art and religion "hidden, secret"  Military and diplomatic use
  • 7. MODERN CRYPTOGHRAPHY Here we have three types of algorithms that we can talk about:  Secret Key Cryptography  Hash Functions  Public Key Cryptography
  • 9. SECRET KEY CRYPTOGHRAPHY  Secret Key(Symmetric) Cryptography uses a single key for both encryption and decryption.
  • 10. SECRET KEY CRYPTOGHRAPHY  A single key is used  Sender uses the key to encrypt  Receiver uses the same key to decrypt  Key must be known to both the sender and the receiver  The difficulty is the distribution of the key
  • 11. SECRET KEY CRYPTOGHRAPHY Secret key cryptography algorithms that are in use today :  Data Encryption Standard (DES):  Advanced Encryption Standard (AES):  International Data Encryption Algorithm (IDEA):
  • 13. HASH FUNCTIONS  Hash functions(One-way cryptography) have no key since plaintext cannot be recovered from the ciphertext.
  • 14. HASH FUNCTIONS  Called message compiler and one-way encryption  No key is used  Digital fingerprint  Provide the integrity
  • 15. HASH FUNCTIONS Hash algorithms that are in common use today:  Message Digest (MD) algorithms:  HAVAL (Hash of Variable Length):  Tiger:
  • 16. PUBLIC KEY CRYPTOGHRAPHY  Public Key(Asymmetric) Cryptography. Two keys are used. One for encryption, one for decryption.
  • 17. PUBLIC KEY CRYPTOGHRAPHY  Developed in the last 300-400 years.  Martin Hellman and graduate student Whitfield Diffie  A two-key crypto system  Mathematical functions
  • 18. PUBLIC KEY CRYPTOGHRAPHY Mathematical Functions :  Multiplication vs. factorization:  Exponentiation vs. logarithms:
  • 21. Why Three Encryption Techniques?  Why are there so many different types of cryptographic schemes?  Why can't we do everything we need with just one ?
  • 22. THE SIGNIFICANCE OF PASSWORDS  Every password can be decyrpted.  In cryptography, size does matter.
  • 23. How to create & use strong Passwords
  • 24. How to create & use strong Passwords  Use lengthy passwords. THANK YOU symbols.  Combine letters, numbers, and FOR LISTENING TO US (:  Use words and phrases.