crytography_new1
TRANSCRIPT
-
7/31/2019 crytography_New1
1/20
S.R.E.S.College Of Engineering,
Kopargaon
-
7/31/2019 crytography_New1
2/20
INTODUCTION
HISTORY
OBEJECTIVE & OVERVIEW
APPLICATIONS
CRYPTOGRAPHY COMPONENTS
TYPES OF CRYPTOGRAPHY
ADVANTAGESCONCLUSION
REFERENCES
Content
-
7/31/2019 crytography_New1
3/20
Cryptography is the science ofinformation security.
The word is derived from theGreek kryptos, meaning hidden.
Cryptography includes techniquessuch as microdots, merging words
with images, and other ways tohide information in storage ortransit.
Introduction
-
7/31/2019 crytography_New1
4/20
History Of Cryptography
-
7/31/2019 crytography_New1
5/20
Confidentiality
Integrity
Authentication
Objectives
-
7/31/2019 crytography_New1
6/20
Overview of Cryptography & ItsApplications
privacy and security in communicating.
In the past, cryptography is heavily used for
militaryapplications to keep sensitive informationsecret from enemies
Cryptography provides most of the methods
and techniques for a secure communication
-
7/31/2019 crytography_New1
7/20
6
CryptographyComponents
-
7/31/2019 crytography_New1
8/20
Encryption It is a process of changing orconverting normal text or data information intogibberish text.
Decryption It is a process of changing or
converting gibberish text back to correctmessage or data by using encryption method.
Cryptography Components
-
7/31/2019 crytography_New1
9/20
10
Categories ofCryptography
-
7/31/2019 crytography_New1
10/20
11
A single common encryption key is used to
encode and decode messages. Both sender and receiver must know the
common key.
Symmetric encryption is simple and fast. But - key management is impractical with
large number of senders and receivers.
Symmetric Key Cryptography
-
7/31/2019 crytography_New1
11/20
11
Symmetric Key Cryptography
-
7/31/2019 crytography_New1
12/20
12
Asymmetric system under, which twodifferent keys are used to encryptand decrypt the message or received
data packet.
On public key is used to encrypt thedata or message and the private key
on receiving end is used to decryptthe message or data packet.
Asymmetric-key Cryptography
-
7/31/2019 crytography_New1
13/20
Asymmetric-key Cryptography
-
7/31/2019 crytography_New1
14/20
Keys used in Cryptography
-
7/31/2019 crytography_New1
15/20
Sender "sign messages by means of
his private secret key. Recipient verify the senders signature
by means of the senders public key. The senders identity is certified by
means of a "Certificate which is
digitally signed by a trusted third party.
Digital Signature &
Certificate
-
7/31/2019 crytography_New1
16/20
Public-key cryptography Increased securityand convenience.
Public-key cryptography is best suited for anopen multi-user environment.
Symmetric encryption is simple and fast.
Advantages
-
7/31/2019 crytography_New1
17/20
cryptography = physics + Information theory
Information is physical.
Information gain implies disturbances.
Conclusion
-
7/31/2019 crytography_New1
18/20
www.bankinfo.com/ecomm/setpart1.html
www.sans.org/infosecFAQ/covertchannels/SET.html
www.cs.jcu.edu.au/~pei/cryptography.html
www.Google.com
References
-
7/31/2019 crytography_New1
19/20
Guided By:-
Prof. Hitesh MohapatraPresented By:-
Durgesh R. Patkari
-
7/31/2019 crytography_New1
20/20