Professional Documents
Culture Documents
Cryptography
Cryptography
By
Nirmalite AMITA MV of Grade IX
CRYPTOGRAPHY – BREAKING THE BARRIERS
Conventional Method
Andy sends message to Sam
Sender Receiver 1. Open message with no protection
2. Visible to any body
3. Threat of information leakage
Cryptographic Method
BENEFITS
TO ENABLE SECRECY & PROTECTION
METHOD OF CRYPTOGRAPHY
SENDE
RECEIVE
R
R
SYMMETRIC CRYPTOGRAPHY
A B
Pa1 Pa2
PRIVATE PRIVATE
KEY KEY
GUESS THE GIBBERISH
YORQRP
GRIFRPZXBPXO
BRUTU
S
JULIUS
CAESAR
ORIGIN AND USAGE OF CRYPTOGRAPHY
CAESAR
Letters were shifted
CIPHER
to the left side or
right side by any
The alphabets which were intended for the number of
message were substituted for other letters in the alphabets. (Mostly
3)
messages. The intended letters were not used This was how Julius
thus making it difficult for others to read. Caesar sent
important letters.
THANK YOU