CRYPTOGRAPHY
BY MANISHA JHA
5TH SEMESTER
CSE
CONTENTS
• Introduction
• Features of cryptography
• Example of Cryptography
• Encryption & Description
• Architecture of Cryptography
• Ciphertext & types of ciphers
• Types of Cryptography
• Advantages
• Disadvantages
INTRODUCTION
• Cryptography derived its word from a Greek word called “Kryptos”
which means “ Hidden-Secrets”. The prefix “crypt” means “hidden” and
suffix graphy means “writing”.
• It is the practice and study of hiding information or it is the practice
and study of techniques for secure communication in the presence of
third parties called adversaries. More generally, cryptography is about
constructing and analyzing protocols that prevent third parties or the
public from reading private messages , various aspects in information
security such as data confidentiality, data integrity, authentication,
and non-repudiation are central to modern cryptography.
It is technique of securing information and communications through use of
codes so that only those person for whom the information is intended can
understand it and process it. Thus preventing unauthorized access to
information. In Cryptography the techniques which are use to protect
information are obtained from mathematical concepts and a set of rule
based calculations known as algorithms to convert messages in ways that
make it hard to decode it.
These algorithms are used for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing on internet and to protect
confidential transactions such as credit card and debit card transactions.
Features Of Cryptography are as follows:
1.Confidentiality:
Information can only be accessed by the person for whom it is intended and no
other person except him can access it.
2.Integrity:
Information cannot be modified in storage or transition between sender and
intended receiver without any addition to information being detected.
3.Non-repudiation:
The creator/sender of information cannot deny his or her intention to send
information at later stage.
4.Authentication:
The identities of sender and receiver are confirmed. As well as destination/origin of
information is confirmed.
Example of Cryptography :
• An example of basic cryptography is a encrypted message in which letters are replaced with
other characters. To decode the encrypted contents, you would need a grid or table that defines
how the letters are transposed.
For example, the translation grid below could be used to decode
“ 3419625 ” as “ MANISHA ” .
The above table is also called a cipher. Ciphers can be simple translation
codes, such as the example above, or complex algorithm.
M 3
A 4
N 1
I 9
S 6
H 2
A 5
Techniques used For Cryptography:
(encryption and decryption)
In today’s age of computers cryptography is often associated with the
process where an ordinary plain text is converted to cipher text(encrypted
text) which is the text made such that intended receiver of the text can only
decode it and hence this process is known as encryption. The process of
conversion of cipher text to plain text this is known as decryption.
Or in simple words , Ciphertext is encrypted text transformed from plaintext using
an encryption algorithm. Ciphertext can't be read until it has been converted
into plaintext (decrypted) with a key. The decryption cipher is an algorithm that
transforms the ciphertext back into plaintext.
Cryptography by manisha jha
Types of ciphers
There are various types of ciphers, including:
•Substitution ciphers. Replace bits, characters, or character blocks in plaintext with alternate bits, characters
or character blocks to produce ciphertext. A substitution cipher may be monoalphabetic or polyalphabetic:
• A single alphabet is used to encrypt the entire plaintext message. For example, if the letter A is
enciphered as the letter K, this will be the same for the entire message.
• A more complex substitution using a mixed alphabet to encrypt each bit, character or character block
of a plaintext message. For instance, the letter A may be encoded as the letter K for part of the
message, but later it might be encoded as the letter W.
•Transposition ciphers. Unlike substitution ciphers that replace letters with other letters, transposition ciphers
keep the letters the same, but rearrange their order according to a specific algorithm. For instance, in a simple
columnar transposition cipher, a message might be read horizontally but would be written vertically to
produce the ciphertext.
•Polygraphic ciphers. Substituting one letter for another letter, a polygraphic cipher performs substitutions
with two or more groups of letters. This masks the frequency distribution of letters, making frequency analysis
attacks much more difficult.
•Permutation ciphers. In this cipher, the positions held by plaintext are shifted to a regular system so that the
ciphertext constitutes a permutation of the plaintext.
Types Of Cryptography:
In general there are three types Of cryptography:
1.Symmetric Key Cryptography:
It is an encryption system where the sender and receiver of message use a single common key to encrypt and
decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver
have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is
Data Encryption System(DES).
2.Hash Functions:
There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text
which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions
to encrypt passwords.
3.Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption
and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known
by everyone the intended receiver can only decode it because he alone knows the private key.
Cryptography by manisha jha
Cryptography by manisha jha
Cryptography by manisha jha
THANK YOU

More Related Content

PDF
Information Security Cryptography ( L01- introduction )
ODP
Encryption presentation final
PDF
Encryption
PPT
Cryptography 1
PPT
Cryptography
PPTX
Overview of cryptography
Information Security Cryptography ( L01- introduction )
Encryption presentation final
Encryption
Cryptography 1
Cryptography
Overview of cryptography

What's hot (20)

PPTX
Cryptography
PPTX
Cryptography by Durlab Kumbhakar
PPS
Criptography
PPT
Cryptography
PPT
Cryptography Fundamentals
PPTX
Advanced cryptography and implementation
PPTX
Crytography
PPTX
Cryptography-Known plain text attack
PPTX
PPTX
Cryptography
PPTX
Cryptography
PPT
Cryptography and E-Commerce
PPTX
cryptography ppt free download
PPTX
Cryptography
PPTX
Cryptanalysis 101
PPTX
Cryptography
PPTX
Caesar cipher
DOC
Cryptography full report
PPTX
Cryptography
Cryptography
Cryptography by Durlab Kumbhakar
Criptography
Cryptography
Cryptography Fundamentals
Advanced cryptography and implementation
Crytography
Cryptography-Known plain text attack
Cryptography
Cryptography
Cryptography and E-Commerce
cryptography ppt free download
Cryptography
Cryptanalysis 101
Cryptography
Caesar cipher
Cryptography full report
Cryptography
Ad

Similar to Cryptography by manisha jha (20)

PDF
UNIT 3 Information Security Sharad Institute
PPTX
4.IS@Mohsin.pptx........................
PPTX
cryptography in computer and its module and application
PDF
Bt0088 cryptography and network security1
DOCX
Cryptography : The Art of Secured Messaging
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
PPTX
groupWork.pptx
PPTX
Introduction to Cryptography for btech cse
PPT
Fundamentals of cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Cryptography
PDF
Evolution of Cryptography and Cryptographic techniques
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Cryptography.pptx
DOCX
Cryptography- "A Black Art"
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PPTX
Unit -1 cryptography contiues with algorithm.pptx
DOC
MAJOR PROJECT FORMAT--2013(new 1)
PPTX
Network security
PDF
Computer Security (Cryptography) Ch01
UNIT 3 Information Security Sharad Institute
4.IS@Mohsin.pptx........................
cryptography in computer and its module and application
Bt0088 cryptography and network security1
Cryptography : The Art of Secured Messaging
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
groupWork.pptx
Introduction to Cryptography for btech cse
Fundamentals of cryptography
Cryptography and Network Security Principles.pptx
Cryptography
Evolution of Cryptography and Cryptographic techniques
Detailed description about the concept of E Commerce UNIT IV.pptx
Cryptography.pptx
Cryptography- "A Black Art"
A Survey on Cryptographic Techniques for Network Security.pdf
Unit -1 cryptography contiues with algorithm.pptx
MAJOR PROJECT FORMAT--2013(new 1)
Network security
Computer Security (Cryptography) Ch01
Ad

Recently uploaded (20)

PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Empowerment Technology for Senior High School Guide
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
advance database management system book.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Trump Administration's workforce development strategy
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Empowerment Technology for Senior High School Guide
Chinmaya Tiranga quiz Grand Finale.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Complications of Minimal Access-Surgery.pdf
Introduction to pro and eukaryotes and differences.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
What if we spent less time fighting change, and more time building what’s rig...
advance database management system book.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Trump Administration's workforce development strategy
Computer Architecture Input Output Memory.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
LDMMIA Reiki Yoga Finals Review Spring Summer
202450812 BayCHI UCSC-SV 20250812 v17.pptx

Cryptography by manisha jha

  • 2. CONTENTS • Introduction • Features of cryptography • Example of Cryptography • Encryption & Description • Architecture of Cryptography • Ciphertext & types of ciphers • Types of Cryptography • Advantages • Disadvantages
  • 3. INTRODUCTION • Cryptography derived its word from a Greek word called “Kryptos” which means “ Hidden-Secrets”. The prefix “crypt” means “hidden” and suffix graphy means “writing”. • It is the practice and study of hiding information or it is the practice and study of techniques for secure communication in the presence of third parties called adversaries. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages , various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography.
  • 4. It is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions.
  • 5. Features Of Cryptography are as follows: 1.Confidentiality: Information can only be accessed by the person for whom it is intended and no other person except him can access it. 2.Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected. 3.Non-repudiation: The creator/sender of information cannot deny his or her intention to send information at later stage. 4.Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.
  • 6. Example of Cryptography : • An example of basic cryptography is a encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed. For example, the translation grid below could be used to decode “ 3419625 ” as “ MANISHA ” . The above table is also called a cipher. Ciphers can be simple translation codes, such as the example above, or complex algorithm. M 3 A 4 N 1 I 9 S 6 H 2 A 5
  • 7. Techniques used For Cryptography: (encryption and decryption) In today’s age of computers cryptography is often associated with the process where an ordinary plain text is converted to cipher text(encrypted text) which is the text made such that intended receiver of the text can only decode it and hence this process is known as encryption. The process of conversion of cipher text to plain text this is known as decryption. Or in simple words , Ciphertext is encrypted text transformed from plaintext using an encryption algorithm. Ciphertext can't be read until it has been converted into plaintext (decrypted) with a key. The decryption cipher is an algorithm that transforms the ciphertext back into plaintext.
  • 9. Types of ciphers There are various types of ciphers, including: •Substitution ciphers. Replace bits, characters, or character blocks in plaintext with alternate bits, characters or character blocks to produce ciphertext. A substitution cipher may be monoalphabetic or polyalphabetic: • A single alphabet is used to encrypt the entire plaintext message. For example, if the letter A is enciphered as the letter K, this will be the same for the entire message. • A more complex substitution using a mixed alphabet to encrypt each bit, character or character block of a plaintext message. For instance, the letter A may be encoded as the letter K for part of the message, but later it might be encoded as the letter W. •Transposition ciphers. Unlike substitution ciphers that replace letters with other letters, transposition ciphers keep the letters the same, but rearrange their order according to a specific algorithm. For instance, in a simple columnar transposition cipher, a message might be read horizontally but would be written vertically to produce the ciphertext. •Polygraphic ciphers. Substituting one letter for another letter, a polygraphic cipher performs substitutions with two or more groups of letters. This masks the frequency distribution of letters, making frequency analysis attacks much more difficult. •Permutation ciphers. In this cipher, the positions held by plaintext are shifted to a regular system so that the ciphertext constitutes a permutation of the plaintext.
  • 10. Types Of Cryptography: In general there are three types Of cryptography: 1.Symmetric Key Cryptography: It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is Data Encryption System(DES). 2.Hash Functions: There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords. 3.Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.