0% found this document useful (0 votes)
106 views10 pages

Cryptography Types Explained

The document summarizes different types of cryptography. It discusses symmetric key cryptography which uses a single secret key, public key cryptography which uses a public/private key pair, and hash algorithms which apply a one-way transformation to a message. Specifically, it provides definitions of cryptography terms like plaintext, ciphertext, algorithms and keys. It also explains the differences between symmetric, public key cryptography and hash functions at a high level in 3 sentences or less.

Uploaded by

vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views10 pages

Cryptography Types Explained

The document summarizes different types of cryptography. It discusses symmetric key cryptography which uses a single secret key, public key cryptography which uses a public/private key pair, and hash algorithms which apply a one-way transformation to a message. Specifically, it provides definitions of cryptography terms like plaintext, ciphertext, algorithms and keys. It also explains the differences between symmetric, public key cryptography and hash functions at a high level in 3 sentences or less.

Uploaded by

vijay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

Presentation On

Cryptography & it’s Types


Presented By - Lohar Vijay Ravindra

Class - BCA -III

Roll No - 17 Sem-VI

Sub - Information Security

Subject in Charge - Dr.A.V.Nikam


Cryptograph
y The art of secret writing.
The art of mangling information into apparent unintelligibility
in a manner allowing a secret method of unmangling.
Cryptography Definitions

• Messages:
– Plaintext
– Ciphertext
• Ingredients:
– Algorithm(s)
– Key(s)
• Players:
– Cryptographer: invents clever algorithms
– Cryptanalyst: breaks clever algorithms
Cryptography
• Algorithm
• Key(s) = secret value(s)
• OK for good algorithm to be public
• Not OK to use bad algorithm
• “Sunlight is the best disinfectant”
• Algorithm without key does not help unmangle the
information
Types of
Cryptography
• Public Key
• Two keys: public & private

• Symmetric Key (aka “Secret Key”)


• One key: secret (but possibly shared)

• Hash Functions
• No keys
Symmetric Key Cryptography

AKA secret key cryptography


AKA conventional cryptography
Public Key Cryptography

AKA asymmetric cryptography


AKA unconventional cryptography (?)

Public key: published, ideally known widely


Private key (NOT “secret key”): not published
Public Key Cryptography
Hash Algorithms
• Message digests / one-way transformations
• easy to compute a hash value for any given message
• infeasible to find a message that has a given hash
• infeasible to modify a message without hash being
changed
• infeasible to find two different messages with the same
hash
Hash Algorithms

You might also like