You are on page 1of 17

CRYPTOGRAPHY

PRESENTED BY : Tanu singh Shubham Pratap Vipul tomar CLASS : IT-6B ROLL NO :

CONTENTS
INTODUCTION HISTORY OBEJECTIVE & OVERVIEW CRYPTOGRAPHY COMPONENTS TYPES OF CRYPTOGRAPHY ADVANTAGES APPLICATIONS CONCLUSION

Cryptography is the art of creating secret codes


The word is derived from the Greek word Kryptos, meaning hidden. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage.

History of Cryptography
The history of cryptography can be expalined as:-

Objectives of Cryptography
Confidentiality:-It means maintaining secrets when we send the piece of information at the remote computer.

Integrity :-Assured the receiver that message has not altered in any way.
Availability:- It means the message is available to the authorized user. Non-reputation:-A mechanism to prove that sender has really send the message.

Components of Cryptography
Encryption It is a process of changing or converting normal text into the cipher text.
Decryption It is a process of changing or converting cipher text back to normal text.

Categories of Cryptography

10

Symmetric-key Cryptography
A single

common encryption key is used to encode and decode messages. Both sender and receiver must know the common key. The common key need to be exchanged before hand by some other secure method. Symmetric encryption is simple and fast. But - key management is impractical with large number of senders and receivers.

11

Symmetric-key Cryptography

11

Asymmetric-key Cryptography
We

call secret key of user as private key and there is no need to send the private key via a secure channel. Every user in the system has one pair of key called public key for encryption and private key for decryption. Each user has a Public key and a corresponding Private (secret) key

12

Asymmetric-key Cryptography

Keys used in Cryptography

Advantages of Cryptography
Asymmetric key cryptography security and convenience. increased

Asymmetric key cryptography is best suited for an open multi-user environment. Symmetric encryption is simple and fast.

Applications of Cryptography
DIGITAL SIGNATURE SMART CARD

ELECTONIC COMMERCE
COMPUTER PASSWORD ATM

CONCLUSION
Cryptography = physics + Information theory Cryptography is only a part of security system. Even though technology is improved it has some deflect . No one in world is perfect and stable.

You might also like