SlideShare a Scribd company logo
Concept of Cryptography

                   Presented by
             KuralAmuthan.C.V
              Nirmalkumar.R.E
                  Ramkumar.M
                 Manimaran.M
What is cryptography

Cryptography is the science of information security.

The word is derived from the Greek, kryptos- hidden
Graphy-writing.

  It’s a efficient method of transmitting messages in a
secured manner.
History of cryptography


  The history of cryptography has been
explained in following slides with pictorial
representation

  It is further classified into
• Ancient cryptography
• Modern cryptography
Ancient cryptography




Sumerian’s cuneiform writing (3500 BC)
Ancient cryptography




Egypt's cryptography writing(1900 BC)
Ancient Cryptography




History tells us that Julius Caesar enciphered his dispatches
by writing D for A
     Ex: If message is “CALL ME” means, It is encrypted to“FDOO PH“
Modern cryptography




“The Enigma Machine” invented by German military
during world war I.
Modern cryptography




German Lorenz cipher machine, used in World War II to
encrypt very-high-level general staff messages
Purpose of cryptography
Authentication: The process of proving one's identity.
Confidentiality: Ensuring that no one can read the
message except the intended receiver.

Integrity: Assuring the receiver that the received
message has not been altered in any way from the original.

Non-repudiation: A mechanism to prove that the
sender really sent this message
Outline of Cryptography
Terminology
Key word
  The shared secret used to keep the message secret
Ciphertext
   The encrypted message
Encryption
  The process of turning plaintext to ciphertext
Decryption
   Opposite to the Encryption
Types of Cryptography

Symmetry cryptography

Asymmetry cryptography

Hash function
Symmetric Cryptography
Uses same key for both encryption and
decryption
Asymmetric Cryptography
Also known as public key
Uses two key (public & private) for encryption
and decryption
           Public key   Private key
Hash function

Hash function also called as message digest

It doesn't require the key, since plaintext not
recovered from ciphertext.

Hash function are typically used for
verification of file content.
Application of cryptography
 There are many applications available. Few
of them listed below.
Digital Signature
Smart card
Electronic commerce
Computer password
ATM
Conclusion
 Cryptography is only the part of security
system
 Its not a magic bullet
 Even though technology improved, there is
some deflect. No one in world is perfect and
stable
 we try improve our self in future needs
Cryptography
Cryptography

More Related Content

PPTX
Cryptography
PPTX
PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPTX
Cryptography.ppt
PPTX
Basic cryptography
Cryptography
Introduction to Cryptography
Cryptography
Cryptography
Cryptography and Network Security
Cryptography.ppt
Basic cryptography

What's hot (20)

PPTX
Cryptography.ppt
PPTX
Overview of cryptography
PPTX
HTTPS
PPT
6. cryptography
PPTX
Email Security Presentation
PPT
Email Security : PGP & SMIME
PDF
Electronic mail security
PPT
Cipher techniques
PDF
Asymmetric Cryptography
PPT
Cryptography Fundamentals
PPTX
Advanced cryptography and implementation
PPT
Cryptography
PPT
cryptography
PPTX
Cryptography
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography
PPTX
Cryptography and Information Security
PPTX
Encryption
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
ODP
Encryption presentation final
Cryptography.ppt
Overview of cryptography
HTTPS
6. cryptography
Email Security Presentation
Email Security : PGP & SMIME
Electronic mail security
Cipher techniques
Asymmetric Cryptography
Cryptography Fundamentals
Advanced cryptography and implementation
Cryptography
cryptography
Cryptography
CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
Cryptography and Information Security
Encryption
What is Asymmetric Encryption? Understand with Simple Examples
Encryption presentation final
Ad

Viewers also liked (20)

PPTX
Crytography
PPTX
Cryptography
PPT
Steganography
PPTX
Cryptography
PPTX
Cryptography Presentation
PPTX
Cryptography
PPT
Cryptography
PPTX
Cryptography by Afroz haider mir
PPTX
Cryptography
PPTX
Cryptography
PPT
Cryptography Intro
PDF
Open and closed thermodynamic system
PDF
Design And Implementation Of A Bangla Compiler
PPSX
System software and operating system
PPT
Gcse Forces And Motion
PDF
Introduction to Cryptography
PDF
Problem Solving with Algorithms and Data Structure - Lists
PDF
Unit 2
PDF
Chapter 2 program-security
PPTX
Code Generation
Crytography
Cryptography
Steganography
Cryptography
Cryptography Presentation
Cryptography
Cryptography
Cryptography by Afroz haider mir
Cryptography
Cryptography
Cryptography Intro
Open and closed thermodynamic system
Design And Implementation Of A Bangla Compiler
System software and operating system
Gcse Forces And Motion
Introduction to Cryptography
Problem Solving with Algorithms and Data Structure - Lists
Unit 2
Chapter 2 program-security
Code Generation
Ad

Similar to Cryptography (20)

PPT
Fundamentals of cryptography
PDF
Crypto_Artemis Final oooo Presentation.pdf
PDF
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
PPTX
cryptography in computer and its module and application
PPTX
Introduction to Cryptography
PPT
Information Cryptography Security
PPTX
Cryptography
PPTX
cryptography presentation this about how cryptography works
PPTX
cryptography
PPTX
Cryptography
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PDF
Evolution of Cryptography and Cryptographic techniques
PPTX
Cryptography
PPTX
Cryptography & Network Security.pptx
PDF
DataMotion-IG1-TheEvolutionofEncryption
PPTX
My cryptography
PDF
Computer Security Chapter III.pdf
PPTX
Cryptography, a science of secure writing
PPTX
Ccn presentation
PPTX
Cryptography
Fundamentals of cryptography
Crypto_Artemis Final oooo Presentation.pdf
WHAT IS CRYPTOGRAPHY - A COMPREHENSIVE GUIDE
cryptography in computer and its module and application
Introduction to Cryptography
Information Cryptography Security
Cryptography
cryptography presentation this about how cryptography works
cryptography
Cryptography
Cryptography.pptxhis document provides an overview of cryptography. It define...
Evolution of Cryptography and Cryptographic techniques
Cryptography
Cryptography & Network Security.pptx
DataMotion-IG1-TheEvolutionofEncryption
My cryptography
Computer Security Chapter III.pdf
Cryptography, a science of secure writing
Ccn presentation
Cryptography

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
master seminar digital applications in india
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Cell Structure & Organelles in detailed.
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
master seminar digital applications in india
102 student loan defaulters named and shamed – Is someone you know on the list?
Module 4: Burden of Disease Tutorial Slides S2 2025
PPH.pptx obstetrics and gynecology in nursing
Renaissance Architecture: A Journey from Faith to Humanism
Complications of Minimal Access Surgery at WLH

Cryptography