You are on page 1of 87

• Introduction to Cryptography/Encryption

• Digital Signatures
• Public Key Infrastructure
• Application of Cryptography
• Tools & Techniques of Cryptography

03/19/24
03/19/24
03/19/24
03/19/24
 key cryptosystem authentication , it is imp
ortant to connect the correct person and the
public key. This is accomplished with the
help of Public Key Infrastructure (PKI).
 It is a s e c u rity a r c h ite c tu r e d e v elop
ed to increase th e c o n fid e n tia lity o f in fo
r m a tio n being exchanged ov er th e
insecure In te rn e t.
 In c r y p to g ra p h y , th e PKI helps to bind
p u b lic keys w ith c o rre s p o n d in g user id
e n titie s by means o f a c e r tific a te a u th
o r ity (CA).
 Using it, anyone can send a confidential message
using public information, which can only be
decrypted with a private-key in the sole
possession of the intended recipient
03/19/24
03/19/24
03/19/24

You might also like