You are on page 1of 20

S.R.E.S.

College Of Engineering, Kopargaon

Content
INTODUCTION HISTORY OBEJECTIVE & OVERVIEW APPLICATIONS CRYPTOGRAPHY COMPONENTS TYPES OF CRYPTOGRAPHY ADVANTAGES CONCLUSION REFERENCES

Introduction

Cryptography is the science of information security. The word is derived from the Greek kryptos, meaning hidden. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.

History Of Cryptography

Objectives

Confidentiality Integrity Authentication

Overview of Cryptography & Its Applications


privacy and security in communicating.
In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies Cryptography provides most of the methods and techniques for a secure communication

Cryptography Components

Cryptography Components
Encryption It is a process of changing or converting normal text or data information into gibberish text. Decryption It is a process of changing or converting gibberish text back to correct message or data by using encryption method.

Categories of Cryptography

10

Symmetric Key Cryptography

A single common encryption key is used to encode and decode messages. Both sender and receiver must know the common key.
Symmetric encryption is simple and fast. But - key management is impractical with large number of senders and receivers.
11

Symmetric Key Cryptography

11

Asymmetric-key Cryptography

Asymmetric system under, which two different keys are used to encrypt and decrypt the message or received data packet.

On public key is used to encrypt the data or message and the private key on receiving end is used to decrypt the message or data packet.

12

Asymmetric-key Cryptography

Keys used in Cryptography

Digital Signature & Certificate


Sender "sign messages by means of his private secret key. Recipient verify the senders signature by means of the senders public key. The senders identity is certified by means of a "Certificate which is digitally signed by a trusted third party.

Advantages
Public-key cryptography Increased security and convenience.

Public-key cryptography is best suited for an open multi-user environment. Symmetric encryption is simple and fast.

Conclusion
cryptography = physics + Information theory Information is physical. Information gain implies disturbances.

References
www.bankinfo.com/ecomm/setpart1.html

www.sans.org/infosecFAQ/covertchannels/SET.html

www.cs.jcu.edu.au/~pei/cryptography.html

www.Google.com

Guided By:Prof. Hitesh Mohapatra

Presented By:Durgesh R. Patkari

You might also like