SlideShare uma empresa Scribd logo
1 de 20
Cryptography
Subodh B. Pawar
Ruksar I. Shaikh
What is Cryptography?
 Cryptography is a method of
storing and transmitting data in a
particular form so that only those
for whom it is intended can read
and process it.
 Cryptography derived its name
from a Greek word called
“Kryptos” which means “Hidden
Secrets”.
History of Cryptography
 The earliest forms of cryptography were found in the
cradle of civilization, including the regions currently
encompassed by Greece and Rome.
Greece: Wrap a tape around a stick and write the
message on the wound tape.
Rome: Caesar Shift Cipher was used.
It utilized the idea of shifting letters by an agreed upon
number (three was a common historical choice), and thus
writing the message using the letter-shift.
Security goals
Secure
Confidentiality
Non-
Repudiatio
n
Authentication
Integrity
Encryption and Decryption
Decryption
key,
Decryption
algorithm
Encryption
key
Encryption
algorithm
Cryptography
Symmetric key Asymmetric key
cryptography cryptography
(Public key cryptography)
Classical Modern
cryptography cryptography
Transposition Substitution Stream Block
cipher cipher cipher cipher
7
Symmetric Key Encryption
•Common Key
•Sharing Prior exchange of info
•Key Needed to be Changed reguraly.
•Length(key) , Computing Power.
Challenges:
1.Key Establishment: Secure Key Establishment.
2.Trust Issue: Receiver Lost key to attacker & no
informed.
Solution:
Why did asymmetric key came into picture?
 People needs to exchange information with non-
familier & non-trusted parties.
 Regular Change Of keys->Complex & Cumbersome.
 Pre-sharing of Secret Keys
Asymmetric
Encryption Different Keys.
 But Mathematically Related.
 Computationally Not Feasible for attacker.
 Each User
 Pair of Key
 Public Key Encryption
Public key Repository & Private Key Guarded.
 Challenges:
 Public key used is really public key of person?
 Solution:
 PKI(public key Infrastructure )
Third Party manages & attest to authenticity of public key
Classical Cryptography
1. Transposition:
-In the transposition technique the positions
of in plaintext is changed with one another.
e.g Plain text: MEET ME AFTER PARTY
 Cipher text: TEMEEMEFAPTRYRAT
 KEY USED: 421635
1 2 3 4 5 6
M E E T M E
A F T E R P
A R T Y
4 2 1 6 3 5
T E M E E M
E F A P T R
Y R A T
13
Every alphabet is shifted with fixed number.
Key: Shift number.
Problem: Only 26 keys to find out.
Modern Cryptography
1.Block Ciphers
-encryption of one block of text at a time
-e.g. : Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa :cipher text
2.Steam Ciphers:
-plaintext is processed one bit at a time
- e.g. : Plain text: Pay 100
Binary of plain text: 010111101 (hypothetical)
Key: 100101011 ----- Perform XOR
____________________
Cipher text 110010110 ----- ZTU9^%D
Encryption and Decryption
algorithms
• Data Encryption Standard(DES)
• Advanced Encryption Standard(AES)
DES Encryption AES Encryption
DES uses only 56 bits key which provides a
combination of 2^56 = 256 combinations for
encryption.
AES can use 128, 192, 256 bits keys which
provides 2^128, 2^192, 2^256 combinations for
encryption.
DES is restricted to use a Block Size of only 64
bits
AES is restricted to use a Block Size of 128 bits
(double of what is used in DES)
With 64 bits block size, the amount of data that
can be transferred with a single encryption key
is just 32GB.
With AES, it is possible to transfer around 256
billion GB of data. It is probably safe to say that
you can use a single AES encryption key for
any application.
DES encryption is breakable through Brute
Force attack.
AES encryption on the other hand is still not
breakable, though there are some theoretical
discussions about breaking the AES.
DES is an old technique used for
encryption/decryption
AES is relatively new.
Time required to check all the possible keys at
50 billion keys per second – For a 56-bit key:
400 days.
Time required to check all the possible keys at
50 billion keys per second – For a 128-bit key:
5x1021 years (which makes it difficult for the
hackers to decrypt the data)
APPLICATIONS
 Defense services
 Secure data manipulation
 E –commerce
 Business transactions
 Internet payment systems
 User identification systems
 Access control
 Data security
CONCLUSION
 By using Cryptography techniques
confidentiality, authentication, integrity,
access control and availability of data is
maintained
 Secure Communication is obtained.
THANK YOU!

Mais conteúdo relacionado

Mais procurados

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 

Mais procurados (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
block ciphers
block ciphersblock ciphers
block ciphers
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Semelhante a Cryptography

Cryptography
CryptographyCryptography
Cryptography
Rohan04
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 

Semelhante a Cryptography (20)

Day5
Day5Day5
Day5
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
FormacaoCrypto
FormacaoCryptoFormacaoCrypto
FormacaoCrypto
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

Último

VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
dipikadinghjn ( Why You Choose Us? ) Escorts
 

Último (20)

VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
Call Girls in New Ashok Nagar, (delhi) call me [9953056974] escort service 24X7
 
Indore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdfIndore Real Estate Market Trends Report.pdf
Indore Real Estate Market Trends Report.pdf
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdf
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdfShrambal_Distributors_Newsletter_Apr-2024 (1).pdf
Shrambal_Distributors_Newsletter_Apr-2024 (1).pdf
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.Gurley shaw Theory of Monetary Economics.
Gurley shaw Theory of Monetary Economics.
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 

Cryptography

  • 2. What is Cryptography?  Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.  Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”.
  • 3. History of Cryptography  The earliest forms of cryptography were found in the cradle of civilization, including the regions currently encompassed by Greece and Rome.
  • 4. Greece: Wrap a tape around a stick and write the message on the wound tape. Rome: Caesar Shift Cipher was used. It utilized the idea of shifting letters by an agreed upon number (three was a common historical choice), and thus writing the message using the letter-shift.
  • 7. Cryptography Symmetric key Asymmetric key cryptography cryptography (Public key cryptography) Classical Modern cryptography cryptography Transposition Substitution Stream Block cipher cipher cipher cipher 7
  • 8. Symmetric Key Encryption •Common Key •Sharing Prior exchange of info •Key Needed to be Changed reguraly. •Length(key) , Computing Power.
  • 9. Challenges: 1.Key Establishment: Secure Key Establishment. 2.Trust Issue: Receiver Lost key to attacker & no informed. Solution: Why did asymmetric key came into picture?  People needs to exchange information with non- familier & non-trusted parties.  Regular Change Of keys->Complex & Cumbersome.  Pre-sharing of Secret Keys
  • 10. Asymmetric Encryption Different Keys.  But Mathematically Related.  Computationally Not Feasible for attacker.  Each User  Pair of Key  Public Key Encryption Public key Repository & Private Key Guarded.
  • 11.  Challenges:  Public key used is really public key of person?  Solution:  PKI(public key Infrastructure ) Third Party manages & attest to authenticity of public key
  • 12. Classical Cryptography 1. Transposition: -In the transposition technique the positions of in plaintext is changed with one another. e.g Plain text: MEET ME AFTER PARTY  Cipher text: TEMEEMEFAPTRYRAT  KEY USED: 421635 1 2 3 4 5 6 M E E T M E A F T E R P A R T Y 4 2 1 6 3 5 T E M E E M E F A P T R Y R A T
  • 13. 13 Every alphabet is shifted with fixed number. Key: Shift number. Problem: Only 26 keys to find out.
  • 14. Modern Cryptography 1.Block Ciphers -encryption of one block of text at a time -e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa :cipher text
  • 15. 2.Steam Ciphers: -plaintext is processed one bit at a time - e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 ----- ZTU9^%D
  • 16. Encryption and Decryption algorithms • Data Encryption Standard(DES) • Advanced Encryption Standard(AES)
  • 17. DES Encryption AES Encryption DES uses only 56 bits key which provides a combination of 2^56 = 256 combinations for encryption. AES can use 128, 192, 256 bits keys which provides 2^128, 2^192, 2^256 combinations for encryption. DES is restricted to use a Block Size of only 64 bits AES is restricted to use a Block Size of 128 bits (double of what is used in DES) With 64 bits block size, the amount of data that can be transferred with a single encryption key is just 32GB. With AES, it is possible to transfer around 256 billion GB of data. It is probably safe to say that you can use a single AES encryption key for any application. DES encryption is breakable through Brute Force attack. AES encryption on the other hand is still not breakable, though there are some theoretical discussions about breaking the AES. DES is an old technique used for encryption/decryption AES is relatively new. Time required to check all the possible keys at 50 billion keys per second – For a 56-bit key: 400 days. Time required to check all the possible keys at 50 billion keys per second – For a 128-bit key: 5x1021 years (which makes it difficult for the hackers to decrypt the data)
  • 18. APPLICATIONS  Defense services  Secure data manipulation  E –commerce  Business transactions  Internet payment systems  User identification systems  Access control  Data security
  • 19. CONCLUSION  By using Cryptography techniques confidentiality, authentication, integrity, access control and availability of data is maintained  Secure Communication is obtained.