You are on page 1of 16

Amity Business School

Submitted by:Reema Singh B-17 Nihar Taranekar F-46

CRYPTOGRAPHY
Amity Business School

The practice and study of techniques for secure communication in the presence of third parties. Cryptography is the science of writing in secret code and is an ancient art; The first documented use of cryptography in writing, dates back to 1900 B.C.

Goals

Amity Business School

There are some specific security requirements, including: Authentication: The process of proving one's identity. Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. Integrity: Assuring the receiver that the received message has not been altered in any way from the original. Non-repudiation: A mechanism to prove that the sender really sent this message.

Amity Business School

Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are three types of cryptographic schemes: secret key (or symmetric) cryptography, Public-key (or asymmetric) cryptography, Hash functions. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext.

Amity Business School

History
Amity Business School

Greeks used Transposition Cipher Asimplese ntenceoft ransposit ioncipher

Becomes
Anri stao ienn mnsc pcpi leop eosh sfie ettr

Amity Business School

Greeks used Substitution Cipher

Amity Business School

Caesar Substitution Cipher with key 3 hello world becomes khoor zruog

Amity Business School

Poly-alphabetic Cipher
Amity Business School

A cipher is polyalphabetic if a given letter of the alphabet will not always enciphered by the same ciphertext letter.

The simplest way to produce a polyalphabetic cipher is to combine different monoalphabetic ciphers.

Amity Business School

Secret key cryptography algorithms that are in use today include:


Data Encryption Standard (DES) Advanced Encryption Standard (AES) CAST-128/256 International Data Encryption Algorithm (IDEA) Rivest Ciphers (aka Ron's Code)

Amity Business School

Public-key cryptography algorithms that are in use today for key exchange or digital signatures include:
RSA Digital Signature Algorithm (DSA) Elliptic Curve Cryptography (ECC) Public-Key Cryptography Standards (PKCS)

Amity Business School

Amity Business School

Amity Business School

Amity Business School

You might also like