SlideShare a Scribd company logo
Institute of Information Technology &
              Management



                        presentation
                            On
                       Cryptography

 Submitted to:-                  Submitted by:-
 D.D Shrivastava Sir             Suraj Shukla
 Dept cs & it                    0915IT091060
                                 IT 3rd year
What is Cryptography
• Cryptography is the science of encrypting and
  decrypting written communication. It comes from the
  Greek word “kryptos ,” meaning hidden, and “graphia
  ,” meaning writing.
• Cryptography is a method of storing and transmitting
  data in a form that only those it is intended for can
  read and process. It is a science of protecting
  information by encoding it into an unreadable format.
  Cryptography is an effective way of protecting
  sensitive information as it is stored on media or
  transmitted through network communication paths
History of Cryptography
• Cryptography has roots that began around 2000
  B.C. in Egypt when hieroglyphics were used to
  decorate tombs to tell the story of the life of the
  deceased.
• A Hebrew cryptographic method required the
  alphabet to be flipped so that each letter in the
  original alphabet is mapped to a different letter
  in the flipped alphabet. The encryption method
  was called atbash.
• ABCDEFGHI JK LMNOPQ R STU VW XYZ
• ZYXWVUTSR QP ONMLKJ I HGF ED CBA
• Security= hvxfirgb
Continue…
Around 400 B.C., the Spartans used a system of encrypting information by
writing a message on a sheet of papyrus, which was wrapped around a staff.
Continue…
• During World War II, simplistic encryption
  device called Enigma machine used for
  tactical communication
Cryptosystem Services
•   Confidentiality
•   Integrity
•   Authenticity
•   Nonrepudiation
•   Access Control
Keyspace
• An algorithm contains a keyspace, which is a
  range of values that can be used to construct a
  key. The key is made up of random values
  within the keyspace range. The larger the
  keyspace, the more available values can be
  used to represent different keys, and the more
  random the keys are, the harder it is for
  intruders to figure them out.
Generation of key
Types of Cryptography
• Stream-based Ciphers-a stream cipher treats the
  message as a stream of bits or bytes and performs
  mathematical functions on them individually.
• Block Ciphers- When a block cipher algorithm is
  used for encryption and decryption purposes, the
  message is divided into blocks of bits. These blocks
  are then put through substitution , transposition ,
  and other mathematical functions.
Cryptography
Cryptography
Cryptographic Methods

• Symmetric
   – Same key for encryption and decryption
   – Key distribution problem
• Asymmetric
   – Mathematically related key pairs for encryption
     and decryption
   – Public and private keys
• Hybrid Encryption Methods(Public Key Cryptography)
Symmetric Algorithms
• Data Encryption Standard (DES)
  – Modes: ECB, CBC, CFB, OFB, CM
• Triple-DES (3DES)
• Advanced Encryption Standard (AES)
• International Data Encryption Algorithm
  (IDEA)
• Blowfish
Example of Symmetric algorithms
Strength and Weakness
• Strengths
     • Much faster than asymmetric systems
     • Hard to break if using a large key size
• Weaknesses
     • Key distribution It requires a secure
  mechanism to deliver keys properly.
     • Limited security It can provide
  confidentiality, but not authenticity.
Asymmetric Algorithms

• RSA(Ron Rivest, Adi Shamir, and Leonard Adleman)
• El Gamal
• Elliptic Curve Cryptography (ECC)
Example of Asymmetric algorithms
Strength and Weakness
• Strengths
    • Better key distribution than symmetric
  systems
    • Better scalability than symmetric systems
    • Can provide confidentiality, authentication,
  and nonrepudiation
• Weaknesses
    • Works much slower than symmetric systems
Hybrid Encryption
In the hybrid approach, the two different
approaches are used in a complementary
manner, with each performing a different
function. A symmetric algorithm creates keys
that are used for encrypting bulk data and an
asymmetric algorithm creates keys that are
used for automated key distribution.
Example of Hybrid Encryption
This is all about Cryptography

          THANK YOU



        Any Queries

More Related Content

PPT
6. cryptography
PPTX
Cryptography
PPT
Cryptography Fundamentals
PPTX
cryptography
PPT
History of cryptography
PPT
Fundamentals of cryptography
PPTX
Cryptography
6. cryptography
Cryptography
Cryptography Fundamentals
cryptography
History of cryptography
Fundamentals of cryptography
Cryptography

What's hot (20)

PPTX
Cryptography
PPTX
Cryptography
PPT
Cryptography Intro
PPTX
Cryptography and Network Security
PPT
Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography and applications
PPT
Cryptography ppt
PPTX
Network security and cryptography
PPTX
Cryptography & Steganography
PPTX
Applications of-linear-algebra-hill-cipher
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
PPT
Cryptography
PPTX
Digital certificates
PPT
Information Security & Cryptography
PPT
Cryptography
PPTX
Cryptography
Cryptography
Cryptography
Cryptography Intro
Cryptography and Network Security
Cryptography
Cryptography.ppt
Cryptography and applications
Cryptography ppt
Network security and cryptography
Cryptography & Steganography
Applications of-linear-algebra-hill-cipher
Cryptography
Cryptography
Cryptography
Cryptography
Digital certificates
Information Security & Cryptography
Cryptography
Cryptography
Ad

Similar to Cryptography (20)

DOCX
Cryptography : The Art of Secured Messaging
PDF
Evolution of Cryptography and Cryptographic techniques
PPTX
Cryptography, a science of secure writing
PPSX
Cryptography
PPSX
5 Cryptography Part1
PPSX
Overview Of Cryptography
PPTX
groupWork.pptx
PPTX
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPT
Cryptography cse,ru
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography and network security
PPTX
Cryptography and network security
PPTX
PPTX
Cryptography and Network Security-ch1-4.pptx
PPTX
Cryptography.pptx
PPT
Crytography
PDF
Basic Cryptography.pdf
Cryptography : The Art of Secured Messaging
Evolution of Cryptography and Cryptographic techniques
Cryptography, a science of secure writing
Cryptography
5 Cryptography Part1
Overview Of Cryptography
groupWork.pptx
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Cryptography cse,ru
Detailed description about the concept of E Commerce UNIT IV.pptx
Cryptography
Cryptography
Cryptography and network security
Cryptography and network security
Cryptography and Network Security-ch1-4.pptx
Cryptography.pptx
Crytography
Basic Cryptography.pdf
Ad

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Basic Mud Logging Guide for educational purpose
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Institutional Correction lecture only . . .
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
master seminar digital applications in india
PPTX
Lesson notes of climatology university.
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
Basic Mud Logging Guide for educational purpose
TR - Agricultural Crops Production NC III.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Sports Quiz easy sports quiz sports quiz
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Institutional Correction lecture only . . .
PPH.pptx obstetrics and gynecology in nursing
master seminar digital applications in india
Lesson notes of climatology university.
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
VCE English Exam - Section C Student Revision Booklet
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Cryptography

  • 1. Institute of Information Technology & Management presentation On Cryptography Submitted to:- Submitted by:- D.D Shrivastava Sir Suraj Shukla Dept cs & it 0915IT091060 IT 3rd year
  • 2. What is Cryptography • Cryptography is the science of encrypting and decrypting written communication. It comes from the Greek word “kryptos ,” meaning hidden, and “graphia ,” meaning writing. • Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through network communication paths
  • 3. History of Cryptography • Cryptography has roots that began around 2000 B.C. in Egypt when hieroglyphics were used to decorate tombs to tell the story of the life of the deceased. • A Hebrew cryptographic method required the alphabet to be flipped so that each letter in the original alphabet is mapped to a different letter in the flipped alphabet. The encryption method was called atbash. • ABCDEFGHI JK LMNOPQ R STU VW XYZ • ZYXWVUTSR QP ONMLKJ I HGF ED CBA • Security= hvxfirgb
  • 4. Continue… Around 400 B.C., the Spartans used a system of encrypting information by writing a message on a sheet of papyrus, which was wrapped around a staff.
  • 5. Continue… • During World War II, simplistic encryption device called Enigma machine used for tactical communication
  • 6. Cryptosystem Services • Confidentiality • Integrity • Authenticity • Nonrepudiation • Access Control
  • 7. Keyspace • An algorithm contains a keyspace, which is a range of values that can be used to construct a key. The key is made up of random values within the keyspace range. The larger the keyspace, the more available values can be used to represent different keys, and the more random the keys are, the harder it is for intruders to figure them out.
  • 9. Types of Cryptography • Stream-based Ciphers-a stream cipher treats the message as a stream of bits or bytes and performs mathematical functions on them individually. • Block Ciphers- When a block cipher algorithm is used for encryption and decryption purposes, the message is divided into blocks of bits. These blocks are then put through substitution , transposition , and other mathematical functions.
  • 12. Cryptographic Methods • Symmetric – Same key for encryption and decryption – Key distribution problem • Asymmetric – Mathematically related key pairs for encryption and decryption – Public and private keys • Hybrid Encryption Methods(Public Key Cryptography)
  • 13. Symmetric Algorithms • Data Encryption Standard (DES) – Modes: ECB, CBC, CFB, OFB, CM • Triple-DES (3DES) • Advanced Encryption Standard (AES) • International Data Encryption Algorithm (IDEA) • Blowfish
  • 14. Example of Symmetric algorithms
  • 15. Strength and Weakness • Strengths • Much faster than asymmetric systems • Hard to break if using a large key size • Weaknesses • Key distribution It requires a secure mechanism to deliver keys properly. • Limited security It can provide confidentiality, but not authenticity.
  • 16. Asymmetric Algorithms • RSA(Ron Rivest, Adi Shamir, and Leonard Adleman) • El Gamal • Elliptic Curve Cryptography (ECC)
  • 17. Example of Asymmetric algorithms
  • 18. Strength and Weakness • Strengths • Better key distribution than symmetric systems • Better scalability than symmetric systems • Can provide confidentiality, authentication, and nonrepudiation • Weaknesses • Works much slower than symmetric systems
  • 19. Hybrid Encryption In the hybrid approach, the two different approaches are used in a complementary manner, with each performing a different function. A symmetric algorithm creates keys that are used for encrypting bulk data and an asymmetric algorithm creates keys that are used for automated key distribution.
  • 20. Example of Hybrid Encryption
  • 21. This is all about Cryptography THANK YOU Any Queries

Editor's Notes

  • #17: RSA, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adlemanused for digital signatures and encryption. It was developed in 1978 at MIT and providesauthentication as well as encryption.