You are on page 1of 9

CRYP TO GRAP HY

Nurturing education through projects

By
Nirmalite AMITA MV of Grade IX
CRYPTOGRAPHY – BREAKING THE BARRIERS
Conventional Method
Andy sends message to Sam
Sender Receiver 1. Open message with no protection
2. Visible to any body
3. Threat of information leakage

Cryptographic Method

Here Sender’s message is encrypted to an


Sender Receiver unreadable format using codes and keys.
Cryptography
-Encrypts
-Decrypts

BENEFITS
TO ENABLE SECRECY & PROTECTION
METHOD OF CRYPTOGRAPHY

PLAIN TEXT ENCRYPTIO CIPHER DECRYPTIO CIPHER


N TEXT N TEXT

SENDE
RECEIVE
R
R
SYMMETRIC CRYPTOGRAPHY

Challenge faced is the exchange of keys


in a safe environment.
PRIVATE KEY
CRYPTOGRAPHY
ASYMMETRIC CRYPTOGRAPHY

A B

Ka1 Public Key Ka2 Public Key

Pa1 Private Key Pa2 Private Key


PUBLIC KEY CRYPTOGRAPHY Both the sender and receiver have a set of public and
private keys
The public key is shared openly where as the private key is
not shared openly.
WHICH PUBLIC KEY AND
P R I VA T E K E Y I S U S E D
RECEIV
SENDE ER
R
Ka1  Receiver’s public key Ka2
is used for encryption
PUBLIC
 Receiver’s private PUBLIC
KEY key is used for KEY
decryption

Pa1 Pa2

PRIVATE PRIVATE
KEY KEY
GUESS THE GIBBERISH

YORQRP
GRIFRPZXBPXO

BRUTU
S
JULIUS
CAESAR
ORIGIN AND USAGE OF CRYPTOGRAPHY

CAESAR
Letters were shifted
CIPHER
to the left side or
right side by any
The alphabets which were intended for the number of
message were substituted for other letters in the alphabets. (Mostly
3)
messages. The intended letters were not used This was how Julius
thus making it difficult for others to read. Caesar sent
important letters.
THANK YOU

You might also like