You are on page 1of 21

CRYPTOGRAPHY

AJAY
SHARMA
CS-C (6 th Sem)
1

CONTENTS
SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION & DECRYPTION
CATEGORIES OF CYRPTOGRAPHY
COMPARISON
CONCLUSION
2

WHAT DOES SECURE MEAN? SECURITY??? 3 .

THREATS 4 .

SECURITY GOALS CONFIDENTIALITY INTEGRITY SECURE NON-REPUDIATION 5 .

6 .CRYPTOGRAPHY • Cryptography is the science and art of transforming messages to make them secure and immune to attack.

BASIC TERMS PLAIN TEXT CIPHER TEXT CIPHER ENCRYPTION & DECRYPTION KEYS 7 .

ENCRYPATION & DECRYPTION 8 .

CATEGORIES OF CRYPTOGRAPHY SYMMETRIC KEY CRYPTOGRAP HY ASYMMETRIC KEY CRYPTOGRAPH Y 9 .

Sender & receiver uses same key & an encryption/decryption algorithm to encrypt/decrypt data. the key is shared.SYMMETRIC KEY CRYPTOGRAPHY • Also known as secret key. 10 .e. i.

SYMMETRIC KEY CRYPTOGRAPHY SENDER RECEIV ER SECRET KEY ENCRYPTIO N CIPHERTE XT DECRYPTIO N 11 .

TRADITIONAL CIPHERS SUBSTITUTIO N CIPHER TRANSPOSITI ON CIPHER 12 .

g. A D. T Z 2 5. e. 3 6 13 .SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plaintext are replaced by other letters/numbers/symbols.

1 2 3 4 5 6 4 2 1 6 3 5 M E E T M E T E M E E M A F T E R P E F A P T R A R T Y Y R A T  Plain text: MEET ME AFTER PARTY  Cipher text: TEMEEMEFAPTRYRAT  KEY USED: 421635 14 .TRANSPOSITION CIPHER In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another.

Sender & receiver uses different keys for encryption & decryption namely PUBLIC & PRIVATE respectively.ASYMMETRIC KEY CRYPTOGRAPHY Also known as public key cryptography. 15 .

ASYMMETRIC KEY CRYPTOGRAPHY SENDER RECEIV ER PUBLIC KEY ENCRYPTIO N PRIVATE KEY CIPHERTE XT DECRYPTIO N 16 .

KEYS USED IN CRYPTOGRAPHY SYMMETRIC KEY CRYPTOGRAP HY ASYMMETRIC KEY CRYPTOGRAPHY 17 .

is available. pair of keys.     18 . one for encryption and one for decryption.   3) It may be impossible or at least 3) It may be impossible or at least impractical to decipher a impractical to decipher a message if no other information message if no other information is available.   2) One of the two keys must be   kept secret.COMPARISON SYMMETRIC CRYPTOGRAPHY KEY ASYMMETRIC CRYPTOGRAPHY KEY 1) The same algorithm with the 1) One algorithm is used for same key is used for encryption and decryption with a encryption and decryption. 2) The key must be kept secret.

APPLICATIONS Defense services Secure data manipulation E –commerce Business transactions Internet payment systems User identification systems Access control Data security  19 .

access control and availability of data is maintained.CONCLUSION By using of encryption techniques a fair unit of confidentiality. 20 . integrity. authentication.

S K N A TH 21 .