Cryptography
Cryptography
AND TECHNOLOGY
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
SEMINAR
ON
“CRYPTOGRAPHY”
PRESENTED BY,
SRILEKHA . R ( 20TC0067)
CONTENT
Abstract
Introduction
Cryptography
Evolution of Cryptography
Types of Cryptography
Cryptography in Everyday Life
Advantages and Disadvantages
Future
Conclusion
ABSTARCT
The same algorithm with the same key is used One algorithm is used for encryption and
for encryption and decryption. decryption with a pair of keys , one for encryption
and one for decryption.
The key must be kept secret. One of the two keys must be kept secret.
It is all about managing cyber risks in all aspects such as It is all about math functions and can be applied in
people, process, technology, etc. technical solutions for increasing cybersecurity.
Its main objective is to prevent or mitigate harm or Its main objective is to keep plain text secret from eaves
destruction of computer networks, applications, devices, or droppers who are trying to have access to some
and data. information about the plain text.
It is generally used for the protection of internet- It is generally used for integrity, entity authentication,
connected systems like software, hardware, and data, data origin authentication, non-repudiation, etc.
risk management, disaster planning, access control,
policies.
CRYPTOGRAPHY IN EVERYDAY
LIFE
Authentication/Digital Signatures
Time Stamping
Electronic Money
Encryption/Decryption in email
Encryption in WhatsApp
Encryption in Instagram
Sim card Authentication
CRYPTOGRAPHY – BENEFITS
• Confidentiality − Encryption technique can guard the information and
communication from unauthorized revelation and access of information.
• Authentication − The cryptographic techniques such as MAC and digital
signatures can protect information against spoofing and forgeries.
• Data Integrity − The cryptographic hash functions are playing vital role
in assuring the users about the data integrity.
• Non-repudiation − The digital signature provides the non-repudiation
service to guard against the dispute that may arise due to denial of passing
message by the sender
CRYPTOGRAPHY – DRAWBACKS
A strongly encrypted, authentic, and digitally signed information can
be difficult to access even for a legitimate user at a crucial time of
decision-making.
High availability, one of the fundamental aspects of information
security, cannot be ensured through the use of cryptography. Other
methods are needed to guard against the threats such as denial of
service or complete breakdown of information system.
Another fundamental need of information security of selective
access control also cannot be realized through the use of
cryptography. Administrative controls and procedures are required to
be exercised for the same.
APPLICATION
Defense Services
Secure data manipulation
E – Commerce
Business transaction
Internet payment system
User identification systems
Access control
Data security
FUTURE OF CRYPTOGRAPHY
Elliptic Curve Cryptography (ECC) has already been invented but its
advantages and disadvantages are not yet fully understood. ECC allows to
perform encryption and decryption in a drastically lesser time, thus
allowing a higher amount of data to be passed with equal security.
However, as other methods of encryption, ECC must also be tested and
proven secure before it is accepted for governmental, commercial, and
private use.
Quantum computation is the new phenomenon. While modern
computers store data using a binary format called a "bit" in which a "1" or a
"0" can be stored; a quantum computer stores data using a quantum
superposition of multiple states. These multiple valued states are stored in
"quantum bits" or "qubits". This allows the computation of numbers to be
several orders of magnitude faster than traditional transistor processors.
CONCLUSION
We use different types of algorithms to establish security
services in different service mechanisms.
We use either private key cryptography or public key
cryptography according to requirement.
If we want to send message quickly we use private key
algorithm and if we want to send messages secretly we
use public key algorithm.
“ONE MUST ACKNOWLEDGE WITH CRYPTOGRAPHY NO AMOUNT OF
VIOLENCE WILL EVER SOLVE A MATH PROBLEM”
THANK YOU