P. 1
Cryptography

Cryptography

|Views: 0|Likes:
Published by Mohit Tiwari

More info:

Published by: Mohit Tiwari on Jul 02, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

05/13/2014

pdf

text

original

CRYPTOGRAPHY

PRESENTED BY : Tanu singh Shubham Pratap Vipul tomar CLASS : IT-6B ROLL NO :

CONTENTS
        INTODUCTION HISTORY OBEJECTIVE & OVERVIEW CRYPTOGRAPHY COMPONENTS TYPES OF CRYPTOGRAPHY ADVANTAGES APPLICATIONS CONCLUSION

Cryptography is the art of creating secret codes
The word is derived from the Greek word Kryptos, meaning hidden. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage.

History of Cryptography
The history of cryptography can be expalined as:-

Objectives of Cryptography
 Confidentiality:-It means maintaining secrets when we send the piece of information at the remote computer.

 Integrity :-Assured the receiver that message has not altered in any way.
 Availability:- It means the message is available to the authorized user.  Non-reputation:-A mechanism to prove that sender has really send the message.

Components of Cryptography
 Encryption – It is a process of changing or converting normal text into the cipher text.
 Decryption – It is a process of changing or converting cipher text back to normal text.

Categories of Cryptography

10

Symmetric-key Cryptography
 A single

common encryption key is used to encode and decode messages.  Both sender and receiver must know the common key.  The common key need to be exchanged before hand by some other secure method.  Symmetric encryption is simple and fast.  But - key management is impractical with large number of senders and receivers.

11

Symmetric-key Cryptography

11

Asymmetric-key Cryptography
 We

call secret key of user as private key and there is no need to send the private key via a secure channel.  Every user in the system has one pair of key called public key for encryption and private key for decryption.  Each user has a Public key and a corresponding Private (secret) key

12

Asymmetric-key Cryptography

Keys used in Cryptography

Advantages of Cryptography
Asymmetric key cryptography security and convenience. increased

Asymmetric key cryptography is best suited for an open multi-user environment. Symmetric encryption is simple and fast.

Applications of Cryptography
 DIGITAL SIGNATURE  SMART CARD

 ELECTONIC COMMERCE
 COMPUTER PASSWORD  ATM

CONCLUSION
 Cryptography = physics + Information theory  Cryptography is only a part of security system.  Even though technology is improved it has some deflect . No one in world is perfect and stable.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->