Professional Documents
Culture Documents
AJAY
SHARMA
CS-C (6 th Sem)
1
CONTENTS
SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION & DECRYPTION
CATEGORIES OF CYRPTOGRAPHY
COMPARISON
CONCLUSION
2
SECURITY???
THREATS
SECURITY GOALS
CONFIDENTIALITY
INTEGRITY
SECURE
NON-REPUDIATION
5
CRYPTOGRAPHY
Cryptography is the
BASIC TERMS
PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION & DECRYPTION
KEYS
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAP
HY
ASYMMETRIC
KEY
CRYPTOGRAPH
Y
SYMMETRIC KEY
CRYPTOGRAPHY
Also known as secret key. Sender &
10
RECEIV
ER
SECRET
KEY
ENCRYPTIO
N
CIPHERTE
XT
DECRYPTIO
N
11
TRADITIONAL
CIPHERS
SUBSTITUTIO
N CIPHER
TRANSPOSITI
ON CIPHER
12
SUBSTITUTION CIPHERS
A substitution technique is one in
13
TRANSPOSITION CIPHER
In the transposition technique the positions of
14
ASYMMETRIC KEY
CRYPTOGRAPHY
Also known as public key
15
RECEIV
ER
PUBLIC
KEY
ENCRYPTIO
N
PRIVATE
KEY
CIPHERTE
XT
DECRYPTIO
N
16
KEYS USED IN
CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAP
HY
ASYMMETRIC
KEY
CRYPTOGRAPHY
17
COMPARISON
SYMMETRIC
CRYPTOGRAPHY
KEY ASYMMETRIC
CRYPTOGRAPHY
KEY
kept secret.
18
APPLICATIONS
Defense services
Secure data manipulation
E commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security
19
CONCLUSION
By using of encryption techniques a fair unit
20
S
K
N
A
TH
21