crytography_new1

Upload: hitesh-mohapatra

Post on 04-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 crytography_New1

    1/20

    S.R.E.S.College Of Engineering,

    Kopargaon

  • 7/31/2019 crytography_New1

    2/20

    INTODUCTION

    HISTORY

    OBEJECTIVE & OVERVIEW

    APPLICATIONS

    CRYPTOGRAPHY COMPONENTS

    TYPES OF CRYPTOGRAPHY

    ADVANTAGESCONCLUSION

    REFERENCES

    Content

  • 7/31/2019 crytography_New1

    3/20

    Cryptography is the science ofinformation security.

    The word is derived from theGreek kryptos, meaning hidden.

    Cryptography includes techniquessuch as microdots, merging words

    with images, and other ways tohide information in storage ortransit.

    Introduction

  • 7/31/2019 crytography_New1

    4/20

    History Of Cryptography

  • 7/31/2019 crytography_New1

    5/20

    Confidentiality

    Integrity

    Authentication

    Objectives

  • 7/31/2019 crytography_New1

    6/20

    Overview of Cryptography & ItsApplications

    privacy and security in communicating.

    In the past, cryptography is heavily used for

    militaryapplications to keep sensitive informationsecret from enemies

    Cryptography provides most of the methods

    and techniques for a secure communication

  • 7/31/2019 crytography_New1

    7/20

    6

    CryptographyComponents

  • 7/31/2019 crytography_New1

    8/20

    Encryption It is a process of changing orconverting normal text or data information intogibberish text.

    Decryption It is a process of changing or

    converting gibberish text back to correctmessage or data by using encryption method.

    Cryptography Components

  • 7/31/2019 crytography_New1

    9/20

    10

    Categories ofCryptography

  • 7/31/2019 crytography_New1

    10/20

    11

    A single common encryption key is used to

    encode and decode messages. Both sender and receiver must know the

    common key.

    Symmetric encryption is simple and fast. But - key management is impractical with

    large number of senders and receivers.

    Symmetric Key Cryptography

  • 7/31/2019 crytography_New1

    11/20

    11

    Symmetric Key Cryptography

  • 7/31/2019 crytography_New1

    12/20

    12

    Asymmetric system under, which twodifferent keys are used to encryptand decrypt the message or received

    data packet.

    On public key is used to encrypt thedata or message and the private key

    on receiving end is used to decryptthe message or data packet.

    Asymmetric-key Cryptography

  • 7/31/2019 crytography_New1

    13/20

    Asymmetric-key Cryptography

  • 7/31/2019 crytography_New1

    14/20

    Keys used in Cryptography

  • 7/31/2019 crytography_New1

    15/20

    Sender "sign messages by means of

    his private secret key. Recipient verify the senders signature

    by means of the senders public key. The senders identity is certified by

    means of a "Certificate which is

    digitally signed by a trusted third party.

    Digital Signature &

    Certificate

  • 7/31/2019 crytography_New1

    16/20

    Public-key cryptography Increased securityand convenience.

    Public-key cryptography is best suited for anopen multi-user environment.

    Symmetric encryption is simple and fast.

    Advantages

  • 7/31/2019 crytography_New1

    17/20

    cryptography = physics + Information theory

    Information is physical.

    Information gain implies disturbances.

    Conclusion

  • 7/31/2019 crytography_New1

    18/20

    www.bankinfo.com/ecomm/setpart1.html

    www.sans.org/infosecFAQ/covertchannels/SET.html

    www.cs.jcu.edu.au/~pei/cryptography.html

    www.Google.com

    References

  • 7/31/2019 crytography_New1

    19/20

    Guided By:-

    Prof. Hitesh MohapatraPresented By:-

    Durgesh R. Patkari

  • 7/31/2019 crytography_New1

    20/20