0% found this document useful (0 votes)
52 views

Cryptography

Cryptography is the science of using mathematics to encrypt and decrypt data to enable secure storage and transmission. The document summarizes the evolution of cryptography from early manual techniques to modern mathematical approaches. It describes symmetric and asymmetric key cryptography as well as hashing and discusses everyday applications like encryption in email and messaging. Benefits include confidentiality, authentication and integrity, while drawbacks relate to availability and selective access control. The future of cryptography may include more efficient algorithms like elliptic curve cryptography and quantum computing approaches.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Cryptography

Cryptography is the science of using mathematics to encrypt and decrypt data to enable secure storage and transmission. The document summarizes the evolution of cryptography from early manual techniques to modern mathematical approaches. It describes symmetric and asymmetric key cryptography as well as hashing and discusses everyday applications like encryption in email and messaging. Benefits include confidentiality, authentication and integrity, while drawbacks relate to availability and selective access control. The future of cryptography may include more efficient algorithms like elliptic curve cryptography and quantum computing approaches.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

RAJIV GANDHI COLLEGE OF ENGINEERING

AND TECHNOLOGY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

SEMINAR
ON
“CRYPTOGRAPHY”

PRESENTED BY,
SRILEKHA . R ( 20TC0067)
CONTENT
 Abstract
 Introduction
 Cryptography
 Evolution of Cryptography
 Types of Cryptography
 Cryptography in Everyday Life
 Advantages and Disadvantages
 Future
 Conclusion
ABSTARCT

Cryptography is the Science of using Mathematics to encrypt


and decrypt data.
Cryptography enables you to store sensitive information or
transmit it across insecure networks so that it cannot be read
by anyone except the intended recipient.
INTRODUCTION
Network security deals with the problems of legitimate messages
being captured and replayed.
 Network security is the effort to create a secure computing
platform.
The action in question can be reduced to operations of access,
modification and deletion.
Many people pay great amounts of lip service to security but do
not want to be bothered with it when it gets in their way .
DIAGRAM
CRYPTOGRAPHY
Cryptography is the science of using mathematics to encrypt
and decrypt data.
Cryptography enables you to store sensitive information or
transmit it across insecure networks (like the internet). So that it
cannot be read by anyone expect the intended recipient.
While cryptography is the science of securing data, cryptanalysts
are also called attackers.
Cryptology embraces both cryptography and cryptanalysis
EVOLUTION OF
CRYPTOGRAPHY
Improved coding techniques such as Vigenere Coding came into
existence in the 15th century.
Only after the 19th century, cryptography evolved from the ad
hoc approaches to encryption to the more sophisticated art and
science of information security.
In the early 20th century, the invention of mechanical and
electromechanical machines, such as the provided more advanced
and efficient means of coding the information.
During the period of World War II, both cryptography and
cryptanalysis became excessively mathematical.
TYPES OF
CRYPTOGRAPHY

1) Symmetric Key Cryptography


2) Hash Function
3) Asymmetric Key Cryptography
SYMMETRIC KEY
CRYPTOGRAPHY
It is an encryption system where the sender and receiver of
message use a single common key to encrypt and decrypt
messages.
Symmetric Key Systems are faster and simpler but the problem
is that sender and receiver have to somehow exchange key in a
secure manner.
The most popular symmetric key cryptography system is Data
Encryption System(DES).
HASH FUNCTION
There is no usage of any key in this algorithm. A hash value with
fixed length is calculated as per the plain text which makes it
impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt
passwords.
ASYMMETRIC KEY CRYPTOGRAPHY

Under this system a pair of keys is used to encrypt and decrypt


information.
A public key is used for encryption and a private key is used for
decryption. Public key and Private Key are different.
Even if the public key is known by everyone the intended
receiver can only decode it because he alone knows the private
key.
COMPARISON
SYMMETRIC KEY ASYMMETRIC KEY
CRYPTOGRAPHY CRYPTOGRAPHY

The same algorithm with the same key is used One algorithm is used for encryption and
for encryption and decryption. decryption with a pair of keys , one for encryption
and one for decryption.

The key must be kept secret. One of the two keys must be kept secret.

It mass be impossible or a at least impractical to It may be impossible or at least impractical to


decipher a message if no other information is decipher a meassage if no other information is
available. available.
DIFFERENCE BETWEEN CYBERSECURITY AND
CRYPTOGRAPHY

Cyber Security Cryptography


It is a process of keeping networks, devices, programs, It is a process of keeping information secret and safe
data secret and safe from damage or unauthorized simply by converting it into unintelligible information
access. and vice-versa.

It is all about managing cyber risks in all aspects such as It is all about math functions and can be applied in
people, process, technology, etc. technical solutions for increasing cybersecurity.

Its main objective is to prevent or mitigate harm or Its main objective is to keep plain text secret from eaves
destruction of computer networks, applications, devices, or droppers who are trying to have access to some
and data. information about the plain text.

It is generally used for the protection of internet- It is generally used for integrity, entity authentication,
connected systems like software, hardware, and data, data origin authentication, non-repudiation, etc.
risk management, disaster planning, access control,
policies.
CRYPTOGRAPHY IN EVERYDAY
LIFE
Authentication/Digital Signatures
Time Stamping
Electronic Money
Encryption/Decryption in email
Encryption in WhatsApp
Encryption in Instagram
Sim card Authentication
CRYPTOGRAPHY – BENEFITS
• Confidentiality − Encryption technique can guard the information and
communication from unauthorized revelation and access of information.
• Authentication − The cryptographic techniques such as MAC and digital
signatures can protect information against spoofing and forgeries.
• Data Integrity − The cryptographic hash functions are playing vital role
in assuring the users about the data integrity.
• Non-repudiation − The digital signature provides the non-repudiation
service to guard against the dispute that may arise due to denial of passing
message by the sender
CRYPTOGRAPHY – DRAWBACKS
A strongly encrypted, authentic, and digitally signed information can
be difficult to access even for a legitimate user at a crucial time of
decision-making.
High availability, one of the fundamental aspects of information
security, cannot be ensured through the use of cryptography. Other
methods are needed to guard against the threats such as denial of
service or complete breakdown of information system.
Another fundamental need of information security of selective
access control also cannot be realized through the use of
cryptography. Administrative controls and procedures are required to
be exercised for the same.
APPLICATION
 Defense Services
 Secure data manipulation
 E – Commerce
 Business transaction
 Internet payment system
 User identification systems
 Access control
 Data security
FUTURE OF CRYPTOGRAPHY
Elliptic Curve Cryptography (ECC) has already been invented but its
advantages and disadvantages are not yet fully understood. ECC allows to
perform encryption and decryption in a drastically lesser time, thus
allowing a higher amount of data to be passed with equal security.
However, as other methods of encryption, ECC must also be tested and
proven secure before it is accepted for governmental, commercial, and
private use.
Quantum computation is the new phenomenon. While modern
computers store data using a binary format called a "bit" in which a "1" or a
"0" can be stored; a quantum computer stores data using a quantum
superposition of multiple states. These multiple valued states are stored in
"quantum bits" or "qubits". This allows the computation of numbers to be
several orders of magnitude faster than traditional transistor processors.
CONCLUSION
We use different types of algorithms to establish security
services in different service mechanisms.
We use either private key cryptography or public key
cryptography according to requirement.
If we want to send message quickly we use private key
algorithm and if we want to send messages secretly we
use public key algorithm.
“ONE MUST ACKNOWLEDGE WITH CRYPTOGRAPHY NO AMOUNT OF
VIOLENCE WILL EVER SOLVE A MATH PROBLEM”

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy