SlideShare a Scribd company logo
14
Most read
19
Most read
21
Most read
KUSUM SHARMA
M.Sc S/W
 SECURITY
 SECURITY THREATS
 SECURITY GOALS
 WHAT IS CRYPTOGRAPHY
 BASIC TERMS
 ENCRYPTION & DECRYPTION
 CATEGORIES OF CYRPTOGRAPHY
 COMPARISON
 CONCLUSION
SECURITY???
Cryptography.ppt
CONFIDENTIALITY INTEGRITY
SECURE
NON-REPUDIATION
• Cryptography is the
science and art of
transforming messages
to make them secure
and immune to attack.
 PLAIN TEXT
 CIPHER TEXT
 CIPHER
 ENCRYPTION & DECRYPTION
 KEYS
Cryptography.ppt
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC KEY
CRYPTOGRAPHY
• Also known as secret key. Sender & receiver
uses same key & an encryption/decryption
algorithm to encrypt/decrypt data. i.e. the key
is shared.
ENCRYPTION DECRYPTION
CIPHERTEXT
SENDER RECEIVER
SECRET KEY
TRADITIONAL
CIPHERS
SUBSTITUTION
CIPHER
TRANSPOSITION
CIPHER
 A substitution technique is one in which the
letters/number/symbols of plaintext are
replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6
 In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with one
another.
 Plain text: MEET ME AFTER PARTY
 Cipher text: TEMEEMEFAPTRYRAT
 KEY USED: 421635
1 2 3 4 5 6
M E E T M E
A F T E R P
A R T Y
4 2 1 6 3 5
T E M E E M
E F A P T R
Y R A T
 Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC &
PRIVATE respectively.
ENCRYPTION DECRYPTION
CIPHERTEXT
SENDER RECEIVER
PUBLIC KEY PRIVATE KEY
SYMMETRIC KEY
CRYPTOGRAPHY
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1) The same algorithm with the same
key is used for encryption and
decryption.
2) The key must be kept secret.
3) It may be impossible or at least
impractical to decipher a message if no
other information is available.
1) One algorithm is used for encryption
and decryption with a pair of keys, one
for encryption and one for decryption.
2) One of the two keys must be kept
secret.
3) It may be impossible or at least
impractical to decipher a message if no
other information is available.
 Defense services
 Secure data manipulation
 E –commerce
 Business transactions
 Internet payment systems
 User identification systems
 Access control
 Data security
 By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access control
and availability of data is maintained.
Cryptography.ppt

More Related Content

PPTX
Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography
PPTX
cryptography ppt free download
PPTX
Introduction to Cryptography
PPTX
Cryptography
PPTX
Cryptography
Cryptography
Cryptography.ppt
Cryptography
cryptography ppt free download
Introduction to Cryptography
Cryptography
Cryptography

What's hot (20)

PPTX
Cryptography and network security
PPTX
Public Key Cryptography
PPTX
Block cipher modes of operation
PPTX
Data Encryption Standard (DES)
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Encryption ppt
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Symmetric and asymmetric key
PPTX
Cryptography
PPT
Message authentication
 
PPTX
RSA Algorithm
PPTX
Cryptography
PPTX
Cryptography - Block cipher & stream cipher
PPT
Diffie-hellman algorithm
PPT
6. cryptography
PPTX
Kerberos
PPTX
Cryptography
PDF
2. public key cryptography and RSA
PDF
Introduction to Cryptography
PPTX
Key Management and Distribution
Cryptography and network security
Public Key Cryptography
Block cipher modes of operation
Data Encryption Standard (DES)
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Encryption ppt
CRYPTOGRAPHY AND NETWORK SECURITY
Symmetric and asymmetric key
Cryptography
Message authentication
 
RSA Algorithm
Cryptography
Cryptography - Block cipher & stream cipher
Diffie-hellman algorithm
6. cryptography
Kerberos
Cryptography
2. public key cryptography and RSA
Introduction to Cryptography
Key Management and Distribution
Ad

Viewers also liked (20)

PPTX
cryptography
PPT
Cloud computing ppt
PDF
Next generation block ciphers
PPT
Network Security and Cryptography
PPTX
types of network
PPTX
Types of computer network
PPT
Digital Signature
DOCX
Data encryption standard
PDF
cns 2marks
PPTX
Trible data encryption standard (3DES)
PDF
Advanced Encryption Standard (AES)
PPTX
Digital signature
PPSX
Advanced Encryption Standard (AES)
PPT
Cryptography
PPT
AES Cryptosystem
PPT
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PPT
Digital signature
PPT
Data encryption standard (des)
cryptography
Cloud computing ppt
Next generation block ciphers
Network Security and Cryptography
types of network
Types of computer network
Digital Signature
Data encryption standard
cns 2marks
Trible data encryption standard (3DES)
Advanced Encryption Standard (AES)
Digital signature
Advanced Encryption Standard (AES)
Cryptography
AES Cryptosystem
Advanced Encryption Standard (AES) Implementaion using Java
Digital signature
Data encryption standard (des)
Ad

Similar to Cryptography.ppt (20)

PPTX
Cryptography ppt by vaishnavi khandelwal
PPTX
Network security
PPTX
PPTX
PPTX
Cryptography
PPTX
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Cryptography by manisha jha
PDF
Survey Paper: Cryptography Is The Science Of Information Security
PPTX
Cryptography
PPTX
cryptography
PDF
UNIT 3 Information Security Sharad Institute
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PDF
Presentation on Cryptography
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPT
Cryptography
PPT
cryptography
PPS
Criptography
Cryptography ppt by vaishnavi khandelwal
Network security
Cryptography
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Detailed description about the concept of E Commerce UNIT IV.pptx
Cryptography
Cryptography and Network Security Principles.pptx
Cryptography by manisha jha
Survey Paper: Cryptography Is The Science Of Information Security
Cryptography
cryptography
UNIT 3 Information Security Sharad Institute
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Presentation on Cryptography
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Cryptography
cryptography
Criptography

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction

Cryptography.ppt