0% found this document useful (0 votes)
42 views11 pages

Cryptography in E-Commerce

Cryptography is used in e-commerce to provide confidentiality, integrity, authentication, and non-repudiation of digital communications and transactions. It uses techniques like symmetric cryptography, where a shared key is used to encrypt and decrypt messages, and asymmetric cryptography which uses public/private key pairs. Specific techniques include transposition ciphers which rearrange the order of letters and substitution ciphers which substitute letters for other letters according to a key. Cryptography ensures secure online shopping and financial transactions.

Uploaded by

Sakshi Narvekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views11 pages

Cryptography in E-Commerce

Cryptography is used in e-commerce to provide confidentiality, integrity, authentication, and non-repudiation of digital communications and transactions. It uses techniques like symmetric cryptography, where a shared key is used to encrypt and decrypt messages, and asymmetric cryptography which uses public/private key pairs. Specific techniques include transposition ciphers which rearrange the order of letters and substitution ciphers which substitute letters for other letters according to a key. Cryptography ensures secure online shopping and financial transactions.

Uploaded by

Sakshi Narvekar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Cryptography in e-

commerce

1
What is Cryptography?
Cryptography is the study of secure communications techniques that
allow only the sender and intended recipient of a message to view its
contents.
3
Why to use cryptography?

Confidentiality Integrity Authentication Non-Repudiation

Protecting data
Protecting Process of Ensures that no
from unauthorized
information from verifying the party can deny
changes to ensure
unauthorised identity of a user that it sent or
that it is reliable
disclosure received a
and correct
message

4
Types of Cryptography :

5
Symmetric Cryptography
An encryption system in which the sender and
receiver of a message share a single, common key
that is used to encrypt and decrypt the message.
Transposition Cipher

Transposition Cipher is a cryptographic


algorithm where the order of alphabets in the
plaintext is rearranged to form a cipher text.
This is an example column transposition cipher

Example :
Plain Text - MEET ME AFTER PARTY
Key Used - 421635
Cipher Text - TEYEFRMAAEPETTMR

7
Substitution Cipher

In a Substitution cipher, any character of plain


text from the given fixed set of characters is
substituted by some other character from the
same set depending on a key. This is an example
of caesar cipher.

Example :
Plain Text - HELLO
Key Used - 13
Cipher Text - URYYB

8
So can you tell us what these cipher text means ?

Transposition cipher Substitution cipher

Key used : 14

Cipher text :
1. DFCHCQCZG
Key used : 31452
2. TCFZCCD
3. DFCXSQH

9
Answers

Transposition cipher Substitution cipher

1. PROTOCOLS
2. FOR LOOP
3. PROJECT

Plain Text - JAIDEEP GOT NO JAMS

10
THANK YOU!!

11

You might also like