You are on page 1of 20

RICHA RAWAT

(MBA integrated
5 sem)

SAKY DMS BHIMTAL


SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION & DECRYPTION
CATEGORIES OF CYRPTOGRAPHY
COMPARISON
CONCLUSION

SAKY DMS BHIMTAL


SAKY DMS BHIMTAL
CONFIDENTIALITY

SECURE

NON-REPUDIATION

SAKY DMS BHIMTAL


Cryptography is the
science and art of
transforming messages
to make them secure
and immune to attack.

SAKY DMS BHIMTAL


PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION & DECRYPTION
KEYS

SAKY DMS BHIMTAL


SAKY DMS BHIMTAL
SYMMETRIC KEY ASYMMETRIC KEY
CRYPTOGRAPHY CRYPTOGRAPHY

SAKY DMS BHIMTAL


Also known as secret key. Sender & receiver
uses same key & an encryption/decryption
algorithm to encrypt/decrypt data. i.e. the key
is shared.

SAKY DMS BHIMTAL


RECEIVER

SECRET KEY

ENCRYPTION DECRYPTION
CIPHERTEXT

SAKY DMS BHIMTAL


SUBSTITUTION TRANSPOSITION
CIPHER CIPHER

SAKY DMS BHIMTAL


A substitution technique is one in which the
letters/number/symbols of plaintext are
replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6

SAKY DMS BHIMTAL


In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with one
another.
1 2 3 4 5 6 4 2 1 6 3 5
M E E T M E
T E M E E M
A F T E R P
E F A P T R
A R T Y
Y R A T

Plain text: MEET ME AFTER PARTY


Cipher text: TEMEEMEFAPTRYRAT
KEY USED: 421635

SAKY DMS BHIMTAL


Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC &
PRIVATE respectively.

SAKY DMS BHIMTAL


RECEIVER

PUBLIC KEY PRIVATE KEY

ENCRYPTION DECRYPTION
CIPHERTEXT

SAKY DMS BHIMTAL


SYMMETRIC KEY
CRYPTOGRAPHY

SAKY DMS BHIMTAL


SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1) The same algorithm with the 1)One algorithm is used for
same key is used for encryption and decryption with
encryption and decryption. a pair of keys, one for
encryption and one for
2) The key must be kept secret. decryption.

2)One of the two keys must be


3)It may be impossible or at kept secret.
least impractical to decipher a
message if no other information 3)It may be impossible or at
is available. least impractical to decipher a
message if no other information
is available.

SAKY DMS BHIMTAL


Defense services
Secure data manipulation
E commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security

SAKY DMS BHIMTAL


By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access control
and availability of data is maintained.

SAKY DMS BHIMTAL


SAKY DMS BHIMTAL

You might also like