Cryptography
INTRODUCTION
 the practice and study of techniques for constructing
and analyzing protocols that overcome the influence
of adversaries and which are related to various aspects
in information such as data confidentiality data
integrity and authentication
 Applications of cryptography include ATM cards,
computer passwords, and electronic commerce
REQUIREMENTS OF A
SECURE NETWORKS
 Authentication: The process of proving one's
identity. (The primary forms of host-to-host
authentication on the Internet today are name-based
or address-based, both of which are notoriously weak.)
 Privacy/confidentiality: Ensuring that no one can
read the message except the intended receiver.
 Integrity: Assuring the receiver that the received
message has not been altered in any way from the
original.
 Non-repudiation: A mechanism to prove that the
sender really sent this message
WORKING OF CRYPTOGRAPHY
OLDEST CRYPTOGRAPHY MACHINE
COMPUTER ERA
 The development of digital computers and electronics
after WWII made possible much more complex
ciphers. Furthermore, computers allowed for the
encryption of any kind of data
 Represent able in any binary format, unlike classical
ciphers which only encrypted written language texts;
this was new and significant. Computer use has thus
supplanted linguistic cryptography, both for cipher
design and cryptanalysis.
TYPES OF CRYPTOGRAPHY
SECRET KEY CRYPTOGRAPHY
 Uses a single key for both encryption and decryption
 With this type of cryptography, both the sender and
the receiver know the same secret code, called the key
 This method works well if you are communicating
with only a limited number of people, but it becomes
impractical to exchange secret keys with large
numbers of people. In addition, there is also the
problem of how you communicate the secret key
securely.
PUBLIC KEY CRYPTOGRAPHY
 Uses one key for encryption and another for
decryption.
 uses a pair of keys for encryption and decryption
 The public key can be freely distributed without
compromising the private key, which must be kept
secret by its owner.
HASH FUNCTION CRYPTOGRAPHY
 A hash function is any algorithm or subroutine that
maps large data cells, called keys, to smaller data sets.
For example, a single integer can serve as an index to
an array.
 Hash functions are mostly used to accelerate table
lookup or data comparison tasks such as finding items
in database, detecting duplicated or similar records in
a large file, finding similar stretches in DNA
sequences, and so on.
PURPOSE OF CRYPTOGRAPHY
 Cryptography is the science of writing in secret code
and is an ancient art; the first documented use of
cryptography in writing dates back to circa 1900 B.C.
 It provides more efficient way of security by encrypting
our data.
 It allows the sender and receiver to communicate more
securily
 It is used in armies from older ages to modern ages. It
allows the armies for exchanging information in the
efficient and secured way.
CONCLUSION
 Some experts argue that cryptography appeared
spontaneously sometime after writing was invented,
with applications ranging from diplomatic missives to
war-time battle plans. It is no surprise, then, that new
forms of cryptography came soon after the widespread
development of computer communications. In data
and telecommunications, cryptography is necessary
when communicating over any untrusted medium,
which includes just about any network, particularly
the Internet.

More Related Content

PPT
Cryptography
PPTX
Cryptography
PPT
cryptography
PPTX
Cryptography and Network Security
PPTX
Cryptography
PPT
Cryptography ppt
PDF
A Brief History of Cryptography
PPTX
Cryptography
Cryptography
Cryptography
cryptography
Cryptography and Network Security
Cryptography
Cryptography ppt
A Brief History of Cryptography
Cryptography

What's hot (20)

PPT
Cryptography
PPT
Digital signature
PDF
What is Cryptography?
PDF
Introduction to Cryptography
PPT
Cryptography Intro
PPT
6. cryptography
PPTX
Cryptography
PPT
Cryptography Fundamentals
PPTX
cryptography
PPTX
Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography.ppt
PPT
History of cryptography
PPT
Ch01
 
PDF
Presentation about RSA
PPTX
Cryptography
PPSX
Cryptography
PDF
Introduction to Cryptography
PDF
Applied Cryptography
Cryptography
Digital signature
What is Cryptography?
Introduction to Cryptography
Cryptography Intro
6. cryptography
Cryptography
Cryptography Fundamentals
cryptography
Cryptography
Cryptography.ppt
Cryptography.ppt
History of cryptography
Ch01
 
Presentation about RSA
Cryptography
Cryptography
Introduction to Cryptography
Applied Cryptography
Ad

Viewers also liked (20)

PPT
Cryptography and Message Authentication NS3
PPTX
Substitution Cipher
PDF
symmetric key encryption algorithms
PPTX
Substitution cipher
PPT
Public key cryptography and RSA
KEY
Alice & bob public key cryptography 101
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PDF
CNIT 141: 9. Elliptic Curve Cryptosystems
PPTX
Information and data security block cipher and the data encryption standard (...
PPT
Ch03 block-cipher-and-data-encryption-standard
PDF
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
KEY
Alice & bob public key cryptography 101
PPTX
Different types of Symmetric key Cryptography
PPTX
Block cipher modes of operation
PPTX
Information and data security block cipher operation
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Cipher techniques
Cryptography and Message Authentication NS3
Substitution Cipher
symmetric key encryption algorithms
Substitution cipher
Public key cryptography and RSA
Alice & bob public key cryptography 101
Block Cipher Modes of Operation And Cmac For Authentication
CNIT 141: 9. Elliptic Curve Cryptosystems
Information and data security block cipher and the data encryption standard (...
Ch03 block-cipher-and-data-encryption-standard
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Alice & bob public key cryptography 101
Different types of Symmetric key Cryptography
Block cipher modes of operation
Information and data security block cipher operation
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cipher techniques
Ad

Similar to Cryptography (20)

PPTX
Introduction to Cryptography CYB 303.pptx
PPTX
online game over cryptography
PPTX
Cryptography
PPTX
Data encryption
PDF
cryptography
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Introduction to Cryptography for btech cse
PDF
s117
PPT
Info security & crypto
PPTX
F16 cs61 cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPT
Chapter 08
DOC
Cryptography full report
PDF
Week 12 slide
PDF
Week 12 slide
PPTX
PPTX
Cryptography
PDF
Week12
PDF
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
PDF
A Study of Different Partitioning Clustering Technique
Introduction to Cryptography CYB 303.pptx
online game over cryptography
Cryptography
Data encryption
cryptography
CRYPTOGRAPHY AND NETWORK SECURITY
Introduction to Cryptography for btech cse
s117
Info security & crypto
F16 cs61 cryptography
Cryptography and Network Security Principles.pptx
Chapter 08
Cryptography full report
Week 12 slide
Week 12 slide
Cryptography
Week12
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A Study of Different Partitioning Clustering Technique

Recently uploaded (20)

PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
STKI Israel Market Study 2025 version august
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Five Habits of High-Impact Board Members
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
The various Industrial Revolutions .pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPT
What is a Computer? Input Devices /output devices
DOCX
search engine optimization ppt fir known well about this
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Build Your First AI Agent with UiPath.pptx
The influence of sentiment analysis in enhancing early warning system model f...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
STKI Israel Market Study 2025 version august
Zenith AI: Advanced Artificial Intelligence
Statistics on Ai - sourced from AIPRM.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A review of recent deep learning applications in wood surface defect identifi...
Five Habits of High-Impact Board Members
A proposed approach for plagiarism detection in Myanmar Unicode text
The various Industrial Revolutions .pptx
UiPath Agentic Automation session 1: RPA to Agents
Getting started with AI Agents and Multi-Agent Systems
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Basics of Cloud Computing - Cloud Ecosystem
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
What is a Computer? Input Devices /output devices
search engine optimization ppt fir known well about this
Enhancing plagiarism detection using data pre-processing and machine learning...
sustainability-14-14877-v2.pddhzftheheeeee
Build Your First AI Agent with UiPath.pptx

Cryptography

  • 2. INTRODUCTION  the practice and study of techniques for constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information such as data confidentiality data integrity and authentication  Applications of cryptography include ATM cards, computer passwords, and electronic commerce
  • 3. REQUIREMENTS OF A SECURE NETWORKS  Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)  Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.  Integrity: Assuring the receiver that the received message has not been altered in any way from the original.  Non-repudiation: A mechanism to prove that the sender really sent this message
  • 6. COMPUTER ERA  The development of digital computers and electronics after WWII made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data  Represent able in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.
  • 8. SECRET KEY CRYPTOGRAPHY  Uses a single key for both encryption and decryption  With this type of cryptography, both the sender and the receiver know the same secret code, called the key  This method works well if you are communicating with only a limited number of people, but it becomes impractical to exchange secret keys with large numbers of people. In addition, there is also the problem of how you communicate the secret key securely.
  • 9. PUBLIC KEY CRYPTOGRAPHY  Uses one key for encryption and another for decryption.  uses a pair of keys for encryption and decryption  The public key can be freely distributed without compromising the private key, which must be kept secret by its owner.
  • 10. HASH FUNCTION CRYPTOGRAPHY  A hash function is any algorithm or subroutine that maps large data cells, called keys, to smaller data sets. For example, a single integer can serve as an index to an array.  Hash functions are mostly used to accelerate table lookup or data comparison tasks such as finding items in database, detecting duplicated or similar records in a large file, finding similar stretches in DNA sequences, and so on.
  • 11. PURPOSE OF CRYPTOGRAPHY  Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C.  It provides more efficient way of security by encrypting our data.  It allows the sender and receiver to communicate more securily  It is used in armies from older ages to modern ages. It allows the armies for exchanging information in the efficient and secured way.
  • 12. CONCLUSION  Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.