SlideShare a Scribd company logo
Presented by:
Guided by:
Laiba Rehman
Mrs. Neelam
Roll No.-
INDEX
 Introduction
 What is cryptography?
 Purpose of cryptography
 Architecture of cryptography
 Characteristics of cryptography
 Types of cryptography
 Process of cryptography
 Types of cryptography algorithms
 Attacks of cryptography
 Conclusion
Introduction
 The internet or the global internet is the internationally
connected network of computer networks with addresses
that are administrated IANA(Internet address and Naming
Authority).
 There are many aspects to security and many applications
,ranging from secure commerce and payments to private
communication and protecting passwords. One essential
aspect for secure communications is that of cryptography.
What is cryptography?
 Cryptography derived its name from a Greek word
called “krypto’s” which means “Hidden Secrets”.
 Cryptography is the practice and study of hiding
information. It is the Art and Science of converting a
plain intelligible data into an unintelligible data and
again retransforming that message into its original
form.
 It provides Confidentiality , Integrity and Accuracy.
Important terms in
cryptography
 Plaintext:
 Encryption:
 Cipher text
 Decryption
 key
 Cryptanalysis:
 Cryptographers:
 Cryptanalysts:
 Cryptology
Caesar Cipher Technique
1. Simple Substitution Technique
2. Working – Encryption
1. Each alphabet in the message is replaced by another alphabet 3
places DOWN the line
3. Working – Decryption
1. Each alphabet in the message
is replaced by another
alphabet 3 places up the line.
A B C D
E
R
Y
P
T
N
C
D E F G
D
E
C
R
Y
P
T
Purpose Of Cryptography
 Authentication: The process of proving one’s identity.
(The primary forms of host-to-host authentication on
the Internet today are name-based or address-based ,
both of which are notoriously weak.)
 Privacy/Confidentiality: Ensuing that no one can read
the message except the intended receiver.
 Integrity: Assuring the receiver that the received
message has not been altered in any way from the
original.
 Non-repudiation: A mechanism to prove that the
sender really sent this message.
Working of encryption and
decryption
Alice
Plain Text
ABC
Cipher Text
DEF
Internet
Cipher Text
DEF
Plain Text
ABC
Bob
Tom
What is
DEF?
Types of cryptographic algorithms
1. Secret key (symmetric) cryptography :
1. same key used to encrypt and decrypt
2. faster compared to public key encryption
3. key needs to be secured securely
2 Public key (asymmetric) cryptography:
1. uses a public key and private key
2. slower compared with symmetric key
Crypto Analysis Attacks
1. Cipher text only attack
(a) Given:
1. Cipher text of many messages , encrypted with
same key
2. C1 = Ek(P1), C2 = Ek(P2),…..Ci = Ek (Pi)
(b) Task
1. Find the plain text of these messages or even
better the key
2.Find P1, P2, …… Pi or K …. Or Pi+1
 Known plain text attack
(a) Given:
1. Cipher text and plain text of the corresponding
messages.
2. P1,C1 = Ek(P1), P2,C2 = Ek(P2) , … Pi,Ci = Ek(Pi)
(b) Task:
1. Find k
2. Or algorithm to infer Pi+1 from CI+!
Conclusion
 Cryptography, being an art of encrypting and
decrypting confidential information and private
messages, should be implemented in the network
security to prevent any leakage and threat.
THANK YOU.

More Related Content

PPTX
Cryptography
PPS
Criptography
PPT
Cryptography ppt
PPTX
cryptography ppt free download
PPT
Cryptography and E-Commerce
PPTX
Cryptography
PPTX
Cryptography Presentation
Cryptography
Criptography
Cryptography ppt
cryptography ppt free download
Cryptography and E-Commerce
Cryptography
Cryptography Presentation

What's hot (19)

PPT
Cryptography
PPTX
Crytography
PPT
Cryptography basices
PPTX
Caesar cipher
PPTX
Crytography
PPTX
PPT
Crytography
PPTX
Cryptography and attacks ins
PPT
Cryptography
PPTX
Overview of cryptography
PPTX
Cryptography
PDF
Cryptology - The practice and study of hiding information
PPTX
Cryptography-Known plain text attack
PPS
network security, cryptography,steganography
PPT
Network security
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
DOCX
Cyber public key cryptography
PDF
Cryptology - Antônio Lacerda
Cryptography
Crytography
Cryptography basices
Caesar cipher
Crytography
Crytography
Cryptography and attacks ins
Cryptography
Overview of cryptography
Cryptography
Cryptology - The practice and study of hiding information
Cryptography-Known plain text attack
network security, cryptography,steganography
Network security
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Cyber public key cryptography
Cryptology - Antônio Lacerda
Ad

Similar to Cryptography (20)

PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PPTX
Cryptography
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPT
Fundamentals of cryptography
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPTX
Cryptography by Durlab Kumbhakar
PDF
Computer Security (Cryptography) Ch01
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PPT
cryptography.ppt.ppt
PPT
cryptography.ppt - Copy.ppt
DOCX
Cryptography- "A Black Art"
PPTX
Key distribution code.ppt
PDF
Cryptography
PDF
Analysis of Cryptography Techniques
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
CSE CRYPTOGRAPHY ppt - Copy.pptx
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
Cryptography
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Fundamentals of cryptography
CSE-CRYPTOGRAPHY-presentation-in-ppt format
Cryptography by Durlab Kumbhakar
Computer Security (Cryptography) Ch01
A Survey on Cryptographic Techniques for Network Security.pdf
cryptography.ppt.ppt
cryptography.ppt - Copy.ppt
Cryptography- "A Black Art"
Key distribution code.ppt
Cryptography
Analysis of Cryptography Techniques
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Ad

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Approach and Philosophy of On baking technology
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
August Patch Tuesday
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
Tartificialntelligence_presentation.pptx
Getting Started with Data Integration: FME Form 101
Unlocking AI with Model Context Protocol (MCP)
Group 1 Presentation -Planning and Decision Making .pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Approach and Philosophy of On baking technology
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Programs and apps: productivity, graphics, security and other tools
Zenith AI: Advanced Artificial Intelligence
SOPHOS-XG Firewall Administrator PPT.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Chapter 5: Probability Theory and Statistics
August Patch Tuesday
Accuracy of neural networks in brain wave diagnosis of schizophrenia
OMC Textile Division Presentation 2021.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hindi spoken digit analysis for native and non-native speakers

Cryptography

  • 1. Presented by: Guided by: Laiba Rehman Mrs. Neelam Roll No.-
  • 2. INDEX  Introduction  What is cryptography?  Purpose of cryptography  Architecture of cryptography  Characteristics of cryptography  Types of cryptography  Process of cryptography  Types of cryptography algorithms  Attacks of cryptography  Conclusion
  • 3. Introduction  The internet or the global internet is the internationally connected network of computer networks with addresses that are administrated IANA(Internet address and Naming Authority).  There are many aspects to security and many applications ,ranging from secure commerce and payments to private communication and protecting passwords. One essential aspect for secure communications is that of cryptography.
  • 4. What is cryptography?  Cryptography derived its name from a Greek word called “krypto’s” which means “Hidden Secrets”.  Cryptography is the practice and study of hiding information. It is the Art and Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form.  It provides Confidentiality , Integrity and Accuracy.
  • 5. Important terms in cryptography  Plaintext:  Encryption:  Cipher text  Decryption  key
  • 6.  Cryptanalysis:  Cryptographers:  Cryptanalysts:  Cryptology
  • 7. Caesar Cipher Technique 1. Simple Substitution Technique 2. Working – Encryption 1. Each alphabet in the message is replaced by another alphabet 3 places DOWN the line 3. Working – Decryption 1. Each alphabet in the message is replaced by another alphabet 3 places up the line. A B C D E R Y P T N C D E F G D E C R Y P T
  • 8. Purpose Of Cryptography  Authentication: The process of proving one’s identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based , both of which are notoriously weak.)  Privacy/Confidentiality: Ensuing that no one can read the message except the intended receiver.
  • 9.  Integrity: Assuring the receiver that the received message has not been altered in any way from the original.  Non-repudiation: A mechanism to prove that the sender really sent this message.
  • 10. Working of encryption and decryption Alice Plain Text ABC Cipher Text DEF Internet Cipher Text DEF Plain Text ABC Bob Tom What is DEF?
  • 11. Types of cryptographic algorithms 1. Secret key (symmetric) cryptography : 1. same key used to encrypt and decrypt 2. faster compared to public key encryption 3. key needs to be secured securely 2 Public key (asymmetric) cryptography: 1. uses a public key and private key 2. slower compared with symmetric key
  • 12. Crypto Analysis Attacks 1. Cipher text only attack (a) Given: 1. Cipher text of many messages , encrypted with same key 2. C1 = Ek(P1), C2 = Ek(P2),…..Ci = Ek (Pi) (b) Task 1. Find the plain text of these messages or even better the key 2.Find P1, P2, …… Pi or K …. Or Pi+1
  • 13.  Known plain text attack (a) Given: 1. Cipher text and plain text of the corresponding messages. 2. P1,C1 = Ek(P1), P2,C2 = Ek(P2) , … Pi,Ci = Ek(Pi) (b) Task: 1. Find k 2. Or algorithm to infer Pi+1 from CI+!
  • 14. Conclusion  Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat.