SlideShare a Scribd company logo
SUBJECT CODE
IV VII
TYPE THE SUBJECT NAME HERE
UNIT NO 1
INTRODUCTION
● Definition
● Terminology
● Applications
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY
(Common to CSE & IT)
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY
(Common to CSE & IT) Introduction to
Cryptography
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Overview
➢ Introduction
➢ Definition
➢ Terminology
➢ History
➢
Goal
and
Servic
es ➢
Appl
icati
on
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Introduction
Cryptography: Cryptography is a method of storing and transmitting data in a particular form so
that only those for whom it is intended can read and process it. Cryptography is closely related
to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as
microdots, merging words with images, and other ways to hide information in storage or transit.
The art and science of concealing the messages to introduce
secrecy in information security is recognized as
cryptography.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Definition
Cryptography is the science of using mathematics to
encrypt and decrypt data.
Phil Zimmermann
Cryptography is the art and science of keeping messages secure.
Bruce Schneier
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Terminologies
A message is plaintext (sometimes called cleartext). The process of
disguising a message in such a way as to hide its substance is encryption. An
encrypted message is ciphertext. The process of turning ciphertext back into
plaintext is decryption.
A cipher (or cypher) is an algorithm for performing encryption or decryption
—a
series of well-defined steps that can be followed as a procedure.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Terminology
A cryptosystem is an implementation of cryptographic techniques
and their accompanying infrastructure to provide information
security services. A cryptosystem is also referred to as a cipher
system. The various components of a basic cryptosystem are as
follows −
§Plaintext §Encryption Algorithm §Ciphertext §Decryption Algorithm
§Encryption Key §Decryption Key
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Terminology
Plaintext: Message that is going to be transmitted or stored is plain text. Anyone
can read plaintext. Encryption: The method by which we can hide the actual
meaning of plaintext is called Encryption. Cipher text: The result of encryption
which results in unreadable gibberish is called Cipher text.
Decryption: The method by which the original meaning of cipher text can be
recovered is called Decryption. Simply the process of converting Cipher text to
plaintext is called Decryption.
Key: Key is the secret piece of information which is used for encryption and decryption in
Cryptography.
Cryptanalysis: The science of retrieving the plain text from cipher without
knowing the key. Cryptanalysts: The people who practice cryptanalysis
are called Cryptanalyst.
Cryptosystem: The combination of algorithm, key, and key management functions
used to perform cryptographic operations.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Cryptology
While cryptography is the science of securing data, cryptanalysis is the
science of analyzing and breaking secure communication. Classical
cryptanalysis involves an interesting combination of analytical reasoning,
application of mathematical tools, pattern finding, patience, determination,
and luck. Cryptanalysts are also called attackers. Cryptology embraces
both cryptography and cryptanalysis.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
History of Cryptography
➢ As civilizations evolved, human beings got organized in
tribes, groups, and kingdoms. This led to the emergence of
ideas such as power, battles, supremacy, and politics.
➢ These ideas further fueled the natural need of people to
communicate secretly with selective recipient which in
turn ensured the continuous evolution of cryptography
as well.
➢ The roots of cryptography are found in Roman and Egyptian
civilizations.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
•Hieroglyph
•The first known evidence of cryptography can be traced to the use
of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to
communicate by messages written in hieroglyph.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE
& IT)
Caesar Shift Cipher
➢ Caesar Shift Cipher, relies on shifting the
letters
of a message by an agreed number (three
was a
common choice), the recipient of this
message
would then shift the letters back by the same
number and obtain the original message.
➢ The Caesar cipher is named after Julius Caesar ,
who used it with a shift of three to protect
messages of military significance.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Caesar Shift Cipher
Encryption Decryption
PLAINTEXT :
CYPHERTEXT :
internet society ghana
chapter lqwhuqhw vrflhwb
jkdqd fkdswhu
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Goal and Services
Goal: The primary goal of cryptography is to secure important data on
the hard disk or as it passes through a medium that may not be secure
itself. Usually, that medium is a computer network.
Services: Cryptography can provide the following services:
•Confidentiality (secrecy)
•Integrity (anti-tampering)
•Authentication
•Non-repudiation.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Confidentiality (secrecy)
•Ensuring that no one can read the message except the
intended receiver
•Data is kept secret from those without the proper
credentials, even if that data travels through an
insecure medium
Integrity (anti-tampering)
•Assuring the receiver that the received message has
not been altered in any way from the original.
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Authentication
Cryptography can help establish identity for
authentication purposes The process of proving
one's identity. (The primary forms of
host-to-host authentication on the
Internet today are name
based or address-based, both of which are
notoriously weak.)
Non-repudiation
A mechanism to prove that the sender really sent this message
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY
(Common to CSE & IT)1. ATM
2.
Email-
Pass
words
3. E-
Paym
ent
4. E-
Comm
erce
5.
Electr
onic
Voting
6.
Defen
ce
Servic
es 7.
Securi
ng
Data
8.
Acces
s
Contr
ol
20ITPC701
CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
Web References:
http://www.cse.iitm.ac.in/~chester/courses/16e_cns/slides/01_Introduction.pdf
Video Link:
https://www.youtube.com/watch?v=IkfggBVUJxY

More Related Content

PPTX
cryptography ppt.pptx this ppt consists of cryptography basics
PPTX
Technical Seminar. cryptography ppt for college
PPT
Fundamentals of cryptography
PPT
Crytography
PPT
cryptography.ppt.ppt
PPT
cryptography.ppt - Copy.ppt
PPTX
Cryptography
PPTX
Cryptography & Network Security.pptx
cryptography ppt.pptx this ppt consists of cryptography basics
Technical Seminar. cryptography ppt for college
Fundamentals of cryptography
Crytography
cryptography.ppt.ppt
cryptography.ppt - Copy.ppt
Cryptography
Cryptography & Network Security.pptx

Similar to 1.1 Introduction about Cryptography and network security (20)

PPTX
PPTX
Cryptography
PDF
Cryptography and network security part a question and answers
DOC
Cryptography full report
PDF
Cryptography Methodologies
PPTX
Cryptography, a science of secure writing
PPTX
Cryptography
PDF
crypto-105058445051058480051448005540405
PDF
In the subject of cryptographySuppose a system uses a Public-Key I.pdf
PDF
Cryptoandnetworksecuritylitreview
PDF
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
PDF
A Study of Different Partitioning Clustering Technique
PPTX
Cyber security
PPTX
Cryptography Presentation
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PPT
Cryptography
PPTX
CN GP 4 Cryptogaraphy.pptx
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
PPTX
Data encryption
PPTX
Cryptogravsgsgsgstysysysytsggsyphy (1).pptx
Cryptography
Cryptography and network security part a question and answers
Cryptography full report
Cryptography Methodologies
Cryptography, a science of secure writing
Cryptography
crypto-105058445051058480051448005540405
In the subject of cryptographySuppose a system uses a Public-Key I.pdf
Cryptoandnetworksecuritylitreview
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A Study of Different Partitioning Clustering Technique
Cyber security
Cryptography Presentation
A Survey on Generation and Evolution of Various Cryptographic Techniques
Cryptography
CN GP 4 Cryptogaraphy.pptx
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Data encryption
Cryptogravsgsgsgstysysysytsggsyphy (1).pptx
Ad

Recently uploaded (20)

PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
web development for engineering and engineering
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Current and future trends in Computer Vision.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Well-logging-methods_new................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
Foundation to blockchain - A guide to Blockchain Tech
web development for engineering and engineering
R24 SURVEYING LAB MANUAL for civil enggi
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Model Code of Practice - Construction Work - 21102022 .pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
UNIT 4 Total Quality Management .pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Current and future trends in Computer Vision.pptx
OOP with Java - Java Introduction (Basics)
Well-logging-methods_new................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Safety Seminar civil to be ensured for safe working.
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
CYBER-CRIMES AND SECURITY A guide to understanding
Ad

1.1 Introduction about Cryptography and network security

  • 1. SUBJECT CODE IV VII TYPE THE SUBJECT NAME HERE UNIT NO 1 INTRODUCTION ● Definition ● Terminology ● Applications 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) 20ITPC701
  • 2. CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Introduction to
  • 3. Cryptography 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
  • 4. Overview ➢ Introduction ➢ Definition ➢ Terminology ➢ History ➢ Goal and Servic es ➢
  • 5. Appl icati on 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Introduction Cryptography: Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit. The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
  • 6. Definition Cryptography is the science of using mathematics to encrypt and decrypt data. Phil Zimmermann Cryptography is the art and science of keeping messages secure. Bruce Schneier 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
  • 7. Terminologies A message is plaintext (sometimes called cleartext). The process of disguising a message in such a way as to hide its substance is encryption. An encrypted message is ciphertext. The process of turning ciphertext back into plaintext is decryption. A cipher (or cypher) is an algorithm for performing encryption or decryption —a series of well-defined steps that can be followed as a procedure. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)
  • 8. Terminology A cryptosystem is an implementation of cryptographic techniques and their accompanying infrastructure to provide information security services. A cryptosystem is also referred to as a cipher system. The various components of a basic cryptosystem are as follows − §Plaintext §Encryption Algorithm §Ciphertext §Decryption Algorithm §Encryption Key §Decryption Key 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Terminology Plaintext: Message that is going to be transmitted or stored is plain text. Anyone can read plaintext. Encryption: The method by which we can hide the actual
  • 9. meaning of plaintext is called Encryption. Cipher text: The result of encryption which results in unreadable gibberish is called Cipher text. Decryption: The method by which the original meaning of cipher text can be recovered is called Decryption. Simply the process of converting Cipher text to plaintext is called Decryption. Key: Key is the secret piece of information which is used for encryption and decryption in Cryptography. Cryptanalysis: The science of retrieving the plain text from cipher without knowing the key. Cryptanalysts: The people who practice cryptanalysis are called Cryptanalyst. Cryptosystem: The combination of algorithm, key, and key management functions used to perform cryptographic operations. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Cryptology While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical
  • 10. cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) History of Cryptography ➢ As civilizations evolved, human beings got organized in tribes, groups, and kingdoms. This led to the emergence of ideas such as power, battles, supremacy, and politics.
  • 11. ➢ These ideas further fueled the natural need of people to communicate secretly with selective recipient which in turn ensured the continuous evolution of cryptography as well. ➢ The roots of cryptography are found in Roman and Egyptian civilizations. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) •Hieroglyph •The first known evidence of cryptography can be traced to the use of ‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate by messages written in hieroglyph.
  • 12. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Caesar Shift Cipher ➢ Caesar Shift Cipher, relies on shifting the letters of a message by an agreed number (three was a common choice), the recipient of this message would then shift the letters back by the same
  • 13. number and obtain the original message. ➢ The Caesar cipher is named after Julius Caesar , who used it with a shift of three to protect messages of military significance. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Caesar Shift Cipher
  • 14. Encryption Decryption PLAINTEXT : CYPHERTEXT : internet society ghana chapter lqwhuqhw vrflhwb jkdqd fkdswhu 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Goal and Services Goal: The primary goal of cryptography is to secure important data on the hard disk or as it passes through a medium that may not be secure itself. Usually, that medium is a computer network.
  • 15. Services: Cryptography can provide the following services: •Confidentiality (secrecy) •Integrity (anti-tampering) •Authentication •Non-repudiation. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Confidentiality (secrecy) •Ensuring that no one can read the message except the intended receiver •Data is kept secret from those without the proper credentials, even if that data travels through an insecure medium
  • 16. Integrity (anti-tampering) •Assuring the receiver that the received message has not been altered in any way from the original. 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Authentication Cryptography can help establish identity for authentication purposes The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name based or address-based, both of which are notoriously weak.) Non-repudiation
  • 17. A mechanism to prove that the sender really sent this message 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT)1. ATM 2. Email- Pass words 3. E- Paym
  • 19. Securi ng Data 8. Acces s Contr ol 20ITPC701 CRYPTOGRAPHY AND NETWORK SECURITY (Common to CSE & IT) Web References: