SlideShare a Scribd company logo
Submitted by- ASMITA PAL
0201CS141017
Submitted to- Asst. Prof. Deepti Tamrakar
Dept. of Computer Science & Engg.
Overview
Security
Security Threats
Security Goals
What is Cryptography
Basic Terms
Encryption & Decryption
Transmission Techniques
Categories of Cryptography
Comparison
Conclusion
Crpto ppt
Security Threats
Security Goals
What is Cryptography?
• Cryptography is the science of using
mathematics to encrypt and decrypt data.
• Cryptography enables you to store
sensitive information or transmit it across
insecure networks so that it cannot be
read by anyone except the intended
recipient.
Basic Terms
• Plaintext: Data that can be read and understood
without any special measures.
• Encryption: The method of disguising plaintext in
such a way as to hide its substance is called
encryption.
• Cipher text: Encrypting plaintext results in
unreadable gibberish called cipher text.
• Decryption: The process of reverting cipher text to
its original plaintext is called decryption.
• Key: some secret piece of information that
customizes how the cipher text is.
Basic Terms cont.
• Cryptanalysis: The art of breaking ciphers,
i.e. retrieving the plaintext without knowing
the proper key.
• Cryptographers: People who do
cryptography.
• Cryptanalysts: Practitioners of cryptanalysis.
• Cryptology: The branch of mathematics that
studies the mathematical foundations of
cryptographic methods.
Encryption & Decryption
Why Use Cryptography?
• For “secret writing”
• To establish a shared secret when
other people (eavesdroppers) are
listening.
• TYPES
Mainly classified into two types:
1. Symmetric key cryptography
2. 2. Asymmetric key cryptography
Transmission Techniques
Categories of Cryptography
Symmetric Key Cryptography
Transposition Cipher
• In classical cryptography, a transposition
cipher changes one character from the
plaintext to another i.e. the order of the
characters is changed.
Substitution Cipher
• Substitution cipher is a method of
encryption by which units of plaintext are
substituted with cipher text according to a
regular system.
Stream Cipher
• A Stream Cipher is a symmetric or secret key encryption
algorithm that encrypts a single bit at a time. With a
Stream Cipher, the same plaintext bit or byte will encrypt
to a different bit or byte every time it is encrypted.
• e.g. : Plain text: Pay 100
Binary of plain text: 010111101
(hypothetical)
Key: 100101011 --
---
Perform XOR
____________________
Cipher text 110010110 ----
-
Block Cipher
• Block cipher technique involves encryption of
one block of text at a time. Decryption also takes
one block of encrypted text at a time. Length of
the block is usually 64 or 128 bits.
• e.g. : Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa ---
cipher text
Asymmetric Key Cryptography
Public key cryptography is an asymmetric scheme that uses a Pair of
keys for encryption: a Public key, which encrypts
data, and a corresponding Private key (secret key) for decryption.
Keys Used In
Cryptography
Conclusion
• Cryptography, being an art of encrypting and
decrypting confidential information and private
messages, should be implemented in the network
security to prevent any leakage and threat.
• It can be done by using any of these techniques
discussed above for fortifying the personal data
transmission as well as for secure transaction.
• By using of encryption & decryption techniques a fair
unit of Confidentiality, Authentication, Integrity, Access
control and Availability of data is maintained.
Crpto ppt

More Related Content

PPT
Cryptography 1
PPTX
Cryptography 130919084510-phpapp02(2)
PPTX
Cryptography
PPTX
PDF
Cryptography for Everyone
PPTX
Cryptography 130919084510-phpapp02
PDF
Encryption
PPTX
Cryptography
Cryptography 1
Cryptography 130919084510-phpapp02(2)
Cryptography
Cryptography for Everyone
Cryptography 130919084510-phpapp02
Encryption
Cryptography

What's hot (20)

PPTX
Cryptography by manisha jha
PPTX
Cryptography
PPTX
Cryptography-Known plain text attack
PPTX
Topic1 substitution transposition-techniques
PDF
Introduction to Cryptography Parts II and III
PDF
Introduction to Cryptography Part I
ODP
Encryption presentation final
PPT
Cryptography
PPS
Itt project
PPTX
Crytography
PDF
What is Cryptography?
PPTX
Cryptography
PPTX
Cryptography
PPTX
Block cipher modes of operation
PPTX
My cryptography
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Cryptography and applications
PPSX
Introductory Lecture on Cryptography and Information Security
PPT
overview of cryptographic techniques
PPT
Cryptography and Network Security
Cryptography by manisha jha
Cryptography
Cryptography-Known plain text attack
Topic1 substitution transposition-techniques
Introduction to Cryptography Parts II and III
Introduction to Cryptography Part I
Encryption presentation final
Cryptography
Itt project
Crytography
What is Cryptography?
Cryptography
Cryptography
Block cipher modes of operation
My cryptography
Cryptography - Block cipher & stream cipher
Cryptography and applications
Introductory Lecture on Cryptography and Information Security
overview of cryptographic techniques
Cryptography and Network Security
Ad

Similar to Crpto ppt (20)

PDF
Analysis of Cryptographic Algorithms for Network Security
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Cryptography and Network Security-ch1-4.pptx
PPT
Cryptography cse,ru
PPTX
Introduction to cryptography part1-final
PPTX
Network Security and Cryptography
PPT
Fundamentals of cryptography
DOCX
Cryptography- "A Black Art"
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PDF
White Paper on Cryptography
PDF
Survey Paper: Cryptography Is The Science Of Information Security
PPT
CRYPTOGRAPHY
PPTX
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
PPTX
CISSP - Chapter 3 - Cryptography
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PDF
Analysis of Cryptography Techniques
PPT
Computer and Network Security
PDF
Cryptography
PPTX
PresentationonCRYPTOGRAPHY.pptx
Analysis of Cryptographic Algorithms for Network Security
Detailed description about the concept of E Commerce UNIT IV.pptx
Cryptography and Network Security-ch1-4.pptx
Cryptography cse,ru
Introduction to cryptography part1-final
Network Security and Cryptography
Fundamentals of cryptography
Cryptography- "A Black Art"
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
White Paper on Cryptography
Survey Paper: Cryptography Is The Science Of Information Security
CRYPTOGRAPHY
Mastering Network Security: Protecting Networks from Cyber Threats with Firew...
CISSP - Chapter 3 - Cryptography
Cryptography.pptxhis document provides an overview of cryptography. It define...
Analysis of Cryptography Techniques
Computer and Network Security
Cryptography
PresentationonCRYPTOGRAPHY.pptx
Ad

Recently uploaded (20)

PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
737-MAX_SRG.pdf student reference guides
PPTX
Artificial Intelligence
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Software Engineering and software moduleing
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPT
Total quality management ppt for engineering students
PPTX
communication and presentation skills 01
PDF
Categorization of Factors Affecting Classification Algorithms Selection
Visual Aids for Exploratory Data Analysis.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
III.4.1.2_The_Space_Environment.p pdffdf
distributed database system" (DDBS) is often used to refer to both the distri...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Safety Seminar civil to be ensured for safe working.
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
737-MAX_SRG.pdf student reference guides
Artificial Intelligence
Abrasive, erosive and cavitation wear.pdf
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Software Engineering and software moduleing
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Management Information system : MIS-e-Business Systems.pptx
Total quality management ppt for engineering students
communication and presentation skills 01
Categorization of Factors Affecting Classification Algorithms Selection

Crpto ppt

  • 1. Submitted by- ASMITA PAL 0201CS141017 Submitted to- Asst. Prof. Deepti Tamrakar Dept. of Computer Science & Engg.
  • 2. Overview Security Security Threats Security Goals What is Cryptography Basic Terms Encryption & Decryption Transmission Techniques Categories of Cryptography Comparison Conclusion
  • 6. What is Cryptography? • Cryptography is the science of using mathematics to encrypt and decrypt data. • Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
  • 7. Basic Terms • Plaintext: Data that can be read and understood without any special measures. • Encryption: The method of disguising plaintext in such a way as to hide its substance is called encryption. • Cipher text: Encrypting plaintext results in unreadable gibberish called cipher text. • Decryption: The process of reverting cipher text to its original plaintext is called decryption. • Key: some secret piece of information that customizes how the cipher text is.
  • 8. Basic Terms cont. • Cryptanalysis: The art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. • Cryptographers: People who do cryptography. • Cryptanalysts: Practitioners of cryptanalysis. • Cryptology: The branch of mathematics that studies the mathematical foundations of cryptographic methods.
  • 10. Why Use Cryptography? • For “secret writing” • To establish a shared secret when other people (eavesdroppers) are listening. • TYPES Mainly classified into two types: 1. Symmetric key cryptography 2. 2. Asymmetric key cryptography
  • 14. Transposition Cipher • In classical cryptography, a transposition cipher changes one character from the plaintext to another i.e. the order of the characters is changed.
  • 15. Substitution Cipher • Substitution cipher is a method of encryption by which units of plaintext are substituted with cipher text according to a regular system.
  • 16. Stream Cipher • A Stream Cipher is a symmetric or secret key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. • e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 -- --- Perform XOR ____________________ Cipher text 110010110 ---- -
  • 17. Block Cipher • Block cipher technique involves encryption of one block of text at a time. Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. • e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa --- cipher text
  • 18. Asymmetric Key Cryptography Public key cryptography is an asymmetric scheme that uses a Pair of keys for encryption: a Public key, which encrypts data, and a corresponding Private key (secret key) for decryption.
  • 20. Conclusion • Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat. • It can be done by using any of these techniques discussed above for fortifying the personal data transmission as well as for secure transaction. • By using of encryption & decryption techniques a fair unit of Confidentiality, Authentication, Integrity, Access control and Availability of data is maintained.