SlideShare uma empresa Scribd logo
1 de 17
Department of Computer Application 
Kalinga Institute of Industrial Technology, 
Bhubneshwar 
By: 
Amrita Mohapatra 
Reg. No.: 0305203034 
E-mail : amrita_19832003@yahoo.co.in
 How the concept of cryptography arises 
 Technical Meaning
Plain text 
Cipher text 
Encryption Algorithm 
Decryption Algorithm
Mathematically 
C = E (M ,K ) 
M = D (M , K )
Traditional methods of cryptography 
Substitution Technique 
Caesar Cipher 
Plain Text M consists of the letter A, B… Z. 
When computing a cipher text “add 3” modulo 26 to each 
letter. 
i.e. A->D, B->E… X->A, Y->B, Z->C. 
Do it for every letter. 
e.g. CAESAR -> FDHVDU. 
The security remains if you hide the fact that you are 
applying Caesar cipher to your message.
Shift Ciphers 
Caesar Cipher  Shift Cipher 
Pick a secret key K from 0-25. 
Add K modulo 26 to all letters. 
C = M+K modulo 26 
For Example :- M = HAL and K = 1 we increment 
each character of HAL by one and find C = IBM
Cryptanalysis of shift Ciphers 
Pivot
Substitution CCiipphheerr ((TTaakkiinngg ppeerrmmuuttaattiioonn ooff 
lleetttteerrss )) 
SSeeccrreett MMeessssaaggee :: -- 
TTKK IILL KKQQ JJKKTT TTKK IILL TTBBSSTT CCRR TTBBLL OOUULLRRTTCCKKJJ 
OOrriiggiinnaall MMeessssaaggee ::-- 
TTOO BBEE OORR NNOOTT TTOO BBEE TTHHAATT IISS TTHHEE QQUUEESSTTIIOONN
TRANSPOSITION TECHNIQUE 
Transposition ciphers are rarely encountered nowadays. They 
differ from both code systems and substitution ciphers; in a 
transposition cipher the letters of the plaintext are shifted 
about to form the cryptogram.
Types of cryptography 
• symmetric key cryptography 
•Asymmetric key cryptography
Symmetric Key Cryptography 
In this kind of encryption the key used for encryption and the key 
used for decryption are the same. 
It is also called as secret key cryptography. 
i.e. Alice and Bob share a key and use that both for encryption and 
decryption. 
We can think this as Alice and Bob together by a lock which has two 
keys of similar kind within it. Alice and Bob both can lock and unlock 
the message as they have the same key. 
Examples: DES, 3-DES, RC4, RC5 etc. (these are the cryptographic 
algorithms currently in use)
Asymmetric Key Cryptography 
In this kind of encryption technique the key used for encryption and the key used for 
decryption are different. 
This is also called as Public Key cryptography. 
Each user has two keys – one public key, which is revealed to all users, and one private 
key, which remains a secret. The private key and the public key are mathematically linked. 
Encryption is performed with the public key and decryption is performed with the private 
key. 
It is something like Alice wants to receive a message from Bob, and then she will give her 
private key to Bob. Bob can lock the message with the private key and send to Alice. No 
one other than Alice can unlock the message as unlocking needs private key and only 
Alice will be knowing her private key. (Let us forget about the detail for now as they are big 
mathematical 
calculations).
Cryptographic services 
• User Authentication
Data authentication 
• Data integrity 
Data origin authentication
Non-repudiation of origin 
Data confidentiality
Cryptography Today 
DES algorithm (a symmetric key) is a famous algorithm 
and widely used. But it was proved that it can be broken in 
just 24 hours with the help of a super computer and a huge 
number of computers working in parallel. 
That is why public key cryptography came into picture and 
RSA algorithm was designed which is widely used now-a-days. 
Cryptography is mostly used in network security and secret 
military communications. 
With the help of digital signature, digital certificate (not 
discussed due to limitation of the scope) the authenticity 
and truth of a particular digital piece is well defined. 
Hash functions and Message Authentication Codes are 
there to make sure that what message goes is not 
modified. 
In case of money transaction in Banks through network 
cryptography is a must, otherwise their would be a havoc 
in the economy.
Criptography

Mais conteúdo relacionado

Mais procurados

Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMsaniacorreya
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 

Mais procurados (20)

Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography for Everyone
Cryptography for EveryoneCryptography for Everyone
Cryptography for Everyone
 

Destaque

Join community criptography in .net
Join community criptography in .netJoin community criptography in .net
Join community criptography in .netRaphael Freitas
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Destaque (8)

Join community criptography in .net
Join community criptography in .netJoin community criptography in .net
Join community criptography in .net
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Network security
Network securityNetwork security
Network security
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Semelhante a Criptography

Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and securityresearch30
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Saif Kassim
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingSumit Satam
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarDurlove Kumbhakar
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxjibonjibon5
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 

Semelhante a Criptography (20)

Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography and security
Cryptography and securityCryptography and security
Cryptography and security
 
Crypt
CryptCrypt
Crypt
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Cns 1
Cns 1Cns 1
Cns 1
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Security pre
Security preSecurity pre
Security pre
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 

Mais de Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middlewareSajan Sahu
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoySajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memorySajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraftSajan Sahu
 
Data compretion
Data compretionData compretion
Data compretionSajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseingSajan Sahu
 
Information system
Information systemInformation system
Information systemSajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatSajan Sahu
 
Database system
Database systemDatabase system
Database systemSajan Sahu
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 
Implimating counter
Implimating counterImplimating counter
Implimating counterSajan Sahu
 

Mais de Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Dna computing
Dna computingDna computing
Dna computing
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Criptography

  • 1. Department of Computer Application Kalinga Institute of Industrial Technology, Bhubneshwar By: Amrita Mohapatra Reg. No.: 0305203034 E-mail : amrita_19832003@yahoo.co.in
  • 2.  How the concept of cryptography arises  Technical Meaning
  • 3. Plain text Cipher text Encryption Algorithm Decryption Algorithm
  • 4. Mathematically C = E (M ,K ) M = D (M , K )
  • 5. Traditional methods of cryptography Substitution Technique Caesar Cipher Plain Text M consists of the letter A, B… Z. When computing a cipher text “add 3” modulo 26 to each letter. i.e. A->D, B->E… X->A, Y->B, Z->C. Do it for every letter. e.g. CAESAR -> FDHVDU. The security remains if you hide the fact that you are applying Caesar cipher to your message.
  • 6. Shift Ciphers Caesar Cipher  Shift Cipher Pick a secret key K from 0-25. Add K modulo 26 to all letters. C = M+K modulo 26 For Example :- M = HAL and K = 1 we increment each character of HAL by one and find C = IBM
  • 7. Cryptanalysis of shift Ciphers Pivot
  • 8. Substitution CCiipphheerr ((TTaakkiinngg ppeerrmmuuttaattiioonn ooff lleetttteerrss )) SSeeccrreett MMeessssaaggee :: -- TTKK IILL KKQQ JJKKTT TTKK IILL TTBBSSTT CCRR TTBBLL OOUULLRRTTCCKKJJ OOrriiggiinnaall MMeessssaaggee ::-- TTOO BBEE OORR NNOOTT TTOO BBEE TTHHAATT IISS TTHHEE QQUUEESSTTIIOONN
  • 9. TRANSPOSITION TECHNIQUE Transposition ciphers are rarely encountered nowadays. They differ from both code systems and substitution ciphers; in a transposition cipher the letters of the plaintext are shifted about to form the cryptogram.
  • 10. Types of cryptography • symmetric key cryptography •Asymmetric key cryptography
  • 11. Symmetric Key Cryptography In this kind of encryption the key used for encryption and the key used for decryption are the same. It is also called as secret key cryptography. i.e. Alice and Bob share a key and use that both for encryption and decryption. We can think this as Alice and Bob together by a lock which has two keys of similar kind within it. Alice and Bob both can lock and unlock the message as they have the same key. Examples: DES, 3-DES, RC4, RC5 etc. (these are the cryptographic algorithms currently in use)
  • 12. Asymmetric Key Cryptography In this kind of encryption technique the key used for encryption and the key used for decryption are different. This is also called as Public Key cryptography. Each user has two keys – one public key, which is revealed to all users, and one private key, which remains a secret. The private key and the public key are mathematically linked. Encryption is performed with the public key and decryption is performed with the private key. It is something like Alice wants to receive a message from Bob, and then she will give her private key to Bob. Bob can lock the message with the private key and send to Alice. No one other than Alice can unlock the message as unlocking needs private key and only Alice will be knowing her private key. (Let us forget about the detail for now as they are big mathematical calculations).
  • 13. Cryptographic services • User Authentication
  • 14. Data authentication • Data integrity Data origin authentication
  • 15. Non-repudiation of origin Data confidentiality
  • 16. Cryptography Today DES algorithm (a symmetric key) is a famous algorithm and widely used. But it was proved that it can be broken in just 24 hours with the help of a super computer and a huge number of computers working in parallel. That is why public key cryptography came into picture and RSA algorithm was designed which is widely used now-a-days. Cryptography is mostly used in network security and secret military communications. With the help of digital signature, digital certificate (not discussed due to limitation of the scope) the authenticity and truth of a particular digital piece is well defined. Hash functions and Message Authentication Codes are there to make sure that what message goes is not modified. In case of money transaction in Banks through network cryptography is a must, otherwise their would be a havoc in the economy.