You are on page 1of 20

Presentation

on
Cryptography

Submitted to: Er. Parveen Garg


(Lect. in CSE & IT Deptt.)

Submitted by:
Monika Sharma
1606048
CSE-6th Sem.
Cryptography

Cryptography is Nothing New

Cryptography is the art of "secret writing".

Cryptography was used in ancient times.

Cryptography was used in both sides of the


revolutionary war.

Cryptography has been featured in may


mystery stories, including Sherlock Holmes.
Cryptography
What is Cryptography

Cryptography is a process of communications.

Cryptography takes something readable and makes it


unreadable.

Cryptography is reversible in a controlled manner.

Cryptography does NOT destroy information.


Cryptography

Cryptography is More Important Now Than Ever

Computers and networks are getting faster and faster.

 Connectivity and access are improving and


increasing.
 Companies now exist which require the net for their
very survival.
Individuals are relying on the net for more and more
personal, professional, and commercial activities.
 There is real value on the net in content,
communications, and commerce.
Cryptography
Threats in the Digital World

Criminals will attack systems for financial gain.


Criminals will use systems for financial gain.
 Privacy violations by marketeers, criminals, and
government agencies.

 Identity theft threatens your reputation and your


ability to prove who you say you are.
Cryptography
The Adversaries
Crackers
Insiders
The Press
Lone Criminals
Organized Crime
Industrial Espionage Agents
International Espionage Agents
Terrorists
National Intelligence
Government Agencies
Cryptography

Cryptography to protect our networks


Cryptography to protect our commerce

Cryptography to protect our communications

Cryptography to protect our files


Cryptography to protect our filesystems
Cryptography to protect our identify
Cryptography

Cryptography Can Do Some Really Cool Stuff


 It can protect your privacy
 It can protect your
communications
 It can protect your property
 It can protect your systems
 It can authenticate
 It can authorize
 It can validate
 It stops a lot of lying and cheating

                                                    


TYPES OF CRYPTOGRAPHIC
ALGORITHMS

• Secret Key Cryptography: Uses a single key for both


encryption and decryption

• Public Key Cryptography: Uses one key for encryption


and another for decryption

• Hash Functions: Uses a mathematical transformation to


irreversibly "encrypt" information
WHAT IS SECRET KEY
CRYPTOGRAPHY ?
Secret Key Cryptography - Types
• stream ciphers :Stream ciphers operate on
a single bit (byte or computer word) at a
time, and implement some form of
feedback mechanism so that the key is
constantly changing.
• block ciphers :the scheme encrypts one
block of data at a time using the same key
on each block.
stream ciphers
Stream ciphers come in several flavors but two are
worth mentioning here :

• Self-synchronizing stream ciphers calculate each


bit in the keystream as a function of the previous n
bits in the keystream

• Synchronous stream ciphers generate the


keystream in a fashion independent of the message
stream but by using the same keystream
generation function at sender and receiver.
Block ciphers
Block ciphers can operate in one of several
modes; the following four are the most
important:

• Electronic Codebook (ECB) mode :


• Cipher Block Chaining (CBC) mode :
• Cipher Feedback (CFB) mode :
• Output Feedback (OFB) mode
Cryptography
Symmetric Key Cryptographic Algorithms

DES

Triple-Des

Blowfish

IDEA

Cast

RC4

RC5

TwoFish
WHAT IS PUBLIC KEY
CRYPTOGRAPHY ?
Cryptography
Public Key Cryptographic Algorithms

 RSA
 Diffie-Hellman
 Elliptic curve

       
Hash Functions
Hash functions, also called message digests and
one-way encryption, are algorithms that, in some
sense, use no key .
Among the most common hash functions in use
today in commercial cryptographic applications
are:
• MD2 (RFC 1319)
• MD4 (RFC 1320)
• MD5 (RFC 1321)
• The Secure Hash Algorithm (SHA) ,in
particular, the SHA-1
Why Three Encryption Techniques?

• Hash functions : for data integrity

• Secret-key cryptography: ideally suited


to encrypting messages

• public-key cryptography : for Key exchange


Cryptography
Future Directions

 Crypto Smart Cards


 Crypto Ring Processors
 Java Rings
 Distributed crypto crackers
 S/MIME Cracking Screen Savers
 "Chinese Television" crypto crackers
 Low cost Beowolf supercomputers
******* THE END ********

You might also like