SlideShare a Scribd company logo
Department of Computer Application 
Kalinga Institute of Industrial Technology, 
Bhubneshwar 
By: 
Amrita Mohapatra 
Reg. No.: 0305203034 
E-mail : amrita_19832003@yahoo.co.in
 How the concept of cryptography arises 
 Technical Meaning
Plain text 
Cipher text 
Encryption Algorithm 
Decryption Algorithm
Mathematically 
C = E (M ,K ) 
M = D (M , K )
Traditional methods of cryptography 
Substitution Technique 
Caesar Cipher 
Plain Text M consists of the letter A, B… Z. 
When computing a cipher text “add 3” modulo 26 to each 
letter. 
i.e. A->D, B->E… X->A, Y->B, Z->C. 
Do it for every letter. 
e.g. CAESAR -> FDHVDU. 
The security remains if you hide the fact that you are 
applying Caesar cipher to your message.
Shift Ciphers 
Caesar Cipher  Shift Cipher 
Pick a secret key K from 0-25. 
Add K modulo 26 to all letters. 
C = M+K modulo 26 
For Example :- M = HAL and K = 1 we increment 
each character of HAL by one and find C = IBM
Cryptanalysis of shift Ciphers 
Pivot
Substitution CCiipphheerr ((TTaakkiinngg ppeerrmmuuttaattiioonn ooff 
lleetttteerrss )) 
SSeeccrreett MMeessssaaggee :: -- 
TTKK IILL KKQQ JJKKTT TTKK IILL TTBBSSTT CCRR TTBBLL OOUULLRRTTCCKKJJ 
OOrriiggiinnaall MMeessssaaggee ::-- 
TTOO BBEE OORR NNOOTT TTOO BBEE TTHHAATT IISS TTHHEE QQUUEESSTTIIOONN
TRANSPOSITION TECHNIQUE 
Transposition ciphers are rarely encountered nowadays. They 
differ from both code systems and substitution ciphers; in a 
transposition cipher the letters of the plaintext are shifted 
about to form the cryptogram.
Types of cryptography 
• symmetric key cryptography 
•Asymmetric key cryptography
Symmetric Key Cryptography 
In this kind of encryption the key used for encryption and the key 
used for decryption are the same. 
It is also called as secret key cryptography. 
i.e. Alice and Bob share a key and use that both for encryption and 
decryption. 
We can think this as Alice and Bob together by a lock which has two 
keys of similar kind within it. Alice and Bob both can lock and unlock 
the message as they have the same key. 
Examples: DES, 3-DES, RC4, RC5 etc. (these are the cryptographic 
algorithms currently in use)
Asymmetric Key Cryptography 
In this kind of encryption technique the key used for encryption and the key used for 
decryption are different. 
This is also called as Public Key cryptography. 
Each user has two keys – one public key, which is revealed to all users, and one private 
key, which remains a secret. The private key and the public key are mathematically linked. 
Encryption is performed with the public key and decryption is performed with the private 
key. 
It is something like Alice wants to receive a message from Bob, and then she will give her 
private key to Bob. Bob can lock the message with the private key and send to Alice. No 
one other than Alice can unlock the message as unlocking needs private key and only 
Alice will be knowing her private key. (Let us forget about the detail for now as they are big 
mathematical 
calculations).
Cryptographic services 
• User Authentication
Data authentication 
• Data integrity 
Data origin authentication
Non-repudiation of origin 
Data confidentiality
Cryptography Today 
DES algorithm (a symmetric key) is a famous algorithm 
and widely used. But it was proved that it can be broken in 
just 24 hours with the help of a super computer and a huge 
number of computers working in parallel. 
That is why public key cryptography came into picture and 
RSA algorithm was designed which is widely used now-a-days. 
Cryptography is mostly used in network security and secret 
military communications. 
With the help of digital signature, digital certificate (not 
discussed due to limitation of the scope) the authenticity 
and truth of a particular digital piece is well defined. 
Hash functions and Message Authentication Codes are 
there to make sure that what message goes is not 
modified. 
In case of money transaction in Banks through network 
cryptography is a must, otherwise their would be a havoc 
in the economy.
Criptography

More Related Content

PPTX
Cryptography
PPTX
cryptography ppt free download
PPTX
Crytography
PPTX
Cryptography
PPT
Cryptography ppt
PPTX
Cryptography
PPT
Cryptography Fundamentals
Cryptography
cryptography ppt free download
Crytography
Cryptography
Cryptography ppt
Cryptography
Cryptography Fundamentals

What's hot (20)

PPTX
Overview of cryptography
PDF
Information Security Cryptography ( L01- introduction )
PPTX
Cryptography-Known plain text attack
PPT
Cryptography
PPTX
Advanced cryptography and implementation
ODP
Encryption presentation final
PPTX
Cryptography
PPT
Cryptography and E-Commerce
PPTX
Cryptography
PPTX
Introduction to Cryptography
PPTX
Cryptography.ppt
PPT
Cryptography
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
DOC
Cryptography full report
PPT
Information Security & Cryptography
PPTX
Caesar cipher
PPT
PPTX
Cryptography
PDF
Cryptography for Everyone
Overview of cryptography
Information Security Cryptography ( L01- introduction )
Cryptography-Known plain text attack
Cryptography
Advanced cryptography and implementation
Encryption presentation final
Cryptography
Cryptography and E-Commerce
Cryptography
Introduction to Cryptography
Cryptography.ppt
Cryptography
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Cryptography full report
Information Security & Cryptography
Caesar cipher
Cryptography
Cryptography for Everyone
Ad

Viewers also liked (8)

PPTX
Join community criptography in .net
PPTX
Visual cryptography
PPT
Cryptography Intro
PPT
Ch11 Basic Cryptography
PPSX
Face recognition technology - BEST PPT
PPT
Network security
PDF
Internet of Things (IoT) - We Are at the Tip of An Iceberg
PPT
Network Security and Cryptography
Join community criptography in .net
Visual cryptography
Cryptography Intro
Ch11 Basic Cryptography
Face recognition technology - BEST PPT
Network security
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Network Security and Cryptography
Ad

Similar to Criptography (20)

PDF
E017212836
PDF
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
PDF
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
PDF
DES- Data Encryption Standard
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
DOCX
Cryptography and security
PPT
Crypt
PDF
Cryptography Methodologies
PDF
Computer Security (Cryptography) Ch01
DOCX
Cryptography : The Art of Secured Messaging
PPTX
Cryptography by Durlab Kumbhakar
PPT
Fundamentals of cryptography
PPT
Introduction To PKI Technology
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
PPTX
PDF
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
PPTX
Seminar on Encryption and Authenticity
PPTX
Security pre
PPTX
Network security and cryptography
E017212836
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
DES- Data Encryption Standard
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Cryptography and security
Crypt
Cryptography Methodologies
Computer Security (Cryptography) Ch01
Cryptography : The Art of Secured Messaging
Cryptography by Durlab Kumbhakar
Fundamentals of cryptography
Introduction To PKI Technology
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Seminar on Encryption and Authenticity
Security pre
Network security and cryptography

More from Sajan Sahu (20)

PPT
Architecture of message oriented middleware
PPT
Insurance envoy
PPT
Computer’s memory
PPT
Automated inspection of aircraft
PPT
Data compretion
PPS
Deadlock
PPT
Data warehouseing
PPT
Information system
PPT
Dna computing
PPT
Wireless application protocol (WAP)
PPT
Blink detection and tracking of eyes for eye localisat
PPS
Database system
PPT
PPT
PPT
Bluetooth
PPT
802.11
PPT
PPT
Internet telephony
PPT
Wcdma
PPT
Implimating counter
Architecture of message oriented middleware
Insurance envoy
Computer’s memory
Automated inspection of aircraft
Data compretion
Deadlock
Data warehouseing
Information system
Dna computing
Wireless application protocol (WAP)
Blink detection and tracking of eyes for eye localisat
Database system
Bluetooth
802.11
Internet telephony
Wcdma
Implimating counter

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding

Criptography

  • 1. Department of Computer Application Kalinga Institute of Industrial Technology, Bhubneshwar By: Amrita Mohapatra Reg. No.: 0305203034 E-mail : amrita_19832003@yahoo.co.in
  • 2.  How the concept of cryptography arises  Technical Meaning
  • 3. Plain text Cipher text Encryption Algorithm Decryption Algorithm
  • 4. Mathematically C = E (M ,K ) M = D (M , K )
  • 5. Traditional methods of cryptography Substitution Technique Caesar Cipher Plain Text M consists of the letter A, B… Z. When computing a cipher text “add 3” modulo 26 to each letter. i.e. A->D, B->E… X->A, Y->B, Z->C. Do it for every letter. e.g. CAESAR -> FDHVDU. The security remains if you hide the fact that you are applying Caesar cipher to your message.
  • 6. Shift Ciphers Caesar Cipher  Shift Cipher Pick a secret key K from 0-25. Add K modulo 26 to all letters. C = M+K modulo 26 For Example :- M = HAL and K = 1 we increment each character of HAL by one and find C = IBM
  • 7. Cryptanalysis of shift Ciphers Pivot
  • 8. Substitution CCiipphheerr ((TTaakkiinngg ppeerrmmuuttaattiioonn ooff lleetttteerrss )) SSeeccrreett MMeessssaaggee :: -- TTKK IILL KKQQ JJKKTT TTKK IILL TTBBSSTT CCRR TTBBLL OOUULLRRTTCCKKJJ OOrriiggiinnaall MMeessssaaggee ::-- TTOO BBEE OORR NNOOTT TTOO BBEE TTHHAATT IISS TTHHEE QQUUEESSTTIIOONN
  • 9. TRANSPOSITION TECHNIQUE Transposition ciphers are rarely encountered nowadays. They differ from both code systems and substitution ciphers; in a transposition cipher the letters of the plaintext are shifted about to form the cryptogram.
  • 10. Types of cryptography • symmetric key cryptography •Asymmetric key cryptography
  • 11. Symmetric Key Cryptography In this kind of encryption the key used for encryption and the key used for decryption are the same. It is also called as secret key cryptography. i.e. Alice and Bob share a key and use that both for encryption and decryption. We can think this as Alice and Bob together by a lock which has two keys of similar kind within it. Alice and Bob both can lock and unlock the message as they have the same key. Examples: DES, 3-DES, RC4, RC5 etc. (these are the cryptographic algorithms currently in use)
  • 12. Asymmetric Key Cryptography In this kind of encryption technique the key used for encryption and the key used for decryption are different. This is also called as Public Key cryptography. Each user has two keys – one public key, which is revealed to all users, and one private key, which remains a secret. The private key and the public key are mathematically linked. Encryption is performed with the public key and decryption is performed with the private key. It is something like Alice wants to receive a message from Bob, and then she will give her private key to Bob. Bob can lock the message with the private key and send to Alice. No one other than Alice can unlock the message as unlocking needs private key and only Alice will be knowing her private key. (Let us forget about the detail for now as they are big mathematical calculations).
  • 13. Cryptographic services • User Authentication
  • 14. Data authentication • Data integrity Data origin authentication
  • 15. Non-repudiation of origin Data confidentiality
  • 16. Cryptography Today DES algorithm (a symmetric key) is a famous algorithm and widely used. But it was proved that it can be broken in just 24 hours with the help of a super computer and a huge number of computers working in parallel. That is why public key cryptography came into picture and RSA algorithm was designed which is widely used now-a-days. Cryptography is mostly used in network security and secret military communications. With the help of digital signature, digital certificate (not discussed due to limitation of the scope) the authenticity and truth of a particular digital piece is well defined. Hash functions and Message Authentication Codes are there to make sure that what message goes is not modified. In case of money transaction in Banks through network cryptography is a must, otherwise their would be a havoc in the economy.