SlideShare a Scribd company logo
9
Most read
10
Most read
13
Most read
‘’ The Science of encrypTion ’’
•   What is cryptography ?


•   Why cryptography is important ?
Contents
•   The purpose of cryptography
•   History of cryptography and cryptanalysis
•   Modern cryptography(Types of Algorithms)
     - Secret Key Cryptography
     - Hash Functions
     - Public Key Cryptography
     - Why Three Encryption Techniques?
     - The Significance of Passwords & Password Security
•   Conclusion
THE PURPOSE OF CRYPTOGRAPHY
Specific security requirements for communication:
  Data transfer and telecommunication
  Science of communications code
  Computer writing in secret

 Authentication:
 Privacy/confidentiality:
 Integrity:
 Non-repudiation:
HISTORY OF CRYPTOGRAPHY
The history of cryptography can be divided into two
parts:

(1) From ancient civilizations to the 19th century and the
first part of the 20th century,


(2) Use of encrypting electro-mechanical
machines, around the period of the WW II.
HISTORY OF CRYPTOGRAPHY
Cryptography was used in three kinds of contexts in
Cryptography::
ancient times

 Private communications
Greek κρυπτός, kryptos,

 Art and religion
"hidden, secret"

 Military and diplomatic use
MODERN CRYPTOGHRAPHY
Here we have three types of algorithms that we can
talk about:

 Secret Key Cryptography

 Hash Functions

 Public Key Cryptography
MODERN CRYPTOGHRAPHY
SECRET KEY CRYPTOGHRAPHY




 Secret Key(Symmetric) Cryptography uses a single
  key for both encryption and decryption.
SECRET KEY CRYPTOGHRAPHY
 A single key is used

 Sender uses the key to encrypt

 Receiver uses the same key to decrypt

 Key must be known to both the sender and the
  receiver

 The difficulty is the distribution of the key
SECRET KEY CRYPTOGHRAPHY
Secret key cryptography algorithms that are in use
today :
 Data Encryption Standard (DES):

 Advanced Encryption Standard (AES):


 International Data Encryption Algorithm (IDEA):
SECRET KEY SUMMARY
HASH FUNCTIONS




 Hash functions(One-way cryptography) have no
  key since plaintext cannot be recovered from the
  ciphertext.
HASH FUNCTIONS
 Called message compiler and one-way encryption

 No key is used

 Digital fingerprint

 Provide the integrity
HASH FUNCTIONS

Hash algorithms that are in common use today:

 Message Digest (MD) algorithms:

 HAVAL (Hash of Variable Length):


 Tiger:
PUBLIC KEY CRYPTOGHRAPHY




 Public Key(Asymmetric) Cryptography. Two keys are
  used. One for encryption, one for decryption.
PUBLIC KEY CRYPTOGHRAPHY
 Developed in the last 300-400 years.

 Martin Hellman and graduate student Whitfield
  Diffie
 A two-key crypto system

 Mathematical functions
PUBLIC KEY CRYPTOGHRAPHY
Mathematical Functions :

 Multiplication vs. factorization:


 Exponentiation vs. logarithms:
PUBLIC KEY CRYPTOGHRAPHY
PUBLIC KEY SUMMARY
Why Three Encryption Techniques?

 Why are there so many different types of
  cryptographic schemes?


 Why can't we do everything we need with just
  one ?
THE SIGNIFICANCE OF PASSWORDS

 Every password can be decyrpted.

 In cryptography, size does matter.
How to create & use strong
        Passwords
How to create & use strong
           Passwords
 Use lengthy passwords.
         THANK YOU symbols.
 Combine letters, numbers, and
 FOR LISTENING TO US (:
 Use words and phrases.

More Related Content

PPTX
Cryptography
PPT
6. cryptography
PPTX
Introduction to Cryptography
PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
cryptography
PPTX
Cryptography
Cryptography
6. cryptography
Introduction to Cryptography
Cryptography
Introduction to Cryptography
cryptography
Cryptography

What's hot (20)

PPTX
Cryptography and Network Security
PPT
Fundamentals of cryptography
PDF
Asymmetric Cryptography
PPT
Cryptography ppt
PPTX
Cryptanalysis 101
PPTX
Cryptography and Information Security
PPT
Cryptography Intro
PPT
Cryptography
PPTX
Overview of cryptography
PPT
Cryptography Fundamentals
PPTX
Advanced cryptography and implementation
PPT
Public Key Cryptography and RSA algorithm
PPTX
Cryptography.ppt
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPTX
Cryptography
PPT
cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography
PPTX
Cryptography
Cryptography and Network Security
Fundamentals of cryptography
Asymmetric Cryptography
Cryptography ppt
Cryptanalysis 101
Cryptography and Information Security
Cryptography Intro
Cryptography
Overview of cryptography
Cryptography Fundamentals
Advanced cryptography and implementation
Public Key Cryptography and RSA algorithm
Cryptography.ppt
Information Security Cryptography ( L02- Types Cryptography)
Cryptography
cryptography
Cryptography.ppt
Cryptography
Cryptography
Ad

Viewers also liked (20)

PPT
PPT
Cryptography
DOC
Cryptography full report
PPT
Steganography
PPTX
Cryptography
PPTX
Cryptography Presentation
PPT
overview of cryptographic techniques
PPTX
Cryptography
PPT
Cryptography
PPTX
Cryptography by Afroz haider mir
DOC
Biometric technology
PPTX
Cryptography
DOC
File transfer using cryptography techniques
PPTX
Cryptography
PPTX
Multi modal biometric system
PDF
Introduction to Cryptography
PDF
steganography using visual cryptography_report
PDF
Cryptanalysis Project Report
PPTX
Cryptography
PDF
Biometrics/fingerprint sensors
Cryptography
Cryptography full report
Steganography
Cryptography
Cryptography Presentation
overview of cryptographic techniques
Cryptography
Cryptography
Cryptography by Afroz haider mir
Biometric technology
Cryptography
File transfer using cryptography techniques
Cryptography
Multi modal biometric system
Introduction to Cryptography
steganography using visual cryptography_report
Cryptanalysis Project Report
Cryptography
Biometrics/fingerprint sensors
Ad

Similar to Cryptography (20)

PPTX
Cryptography, a science of secure writing
PPTX
Er. Sanjeev Raaz
DOCX
Cryptography : The Art of Secured Messaging
PPTX
Cryptography by Durlab Kumbhakar
PPSX
Overview Of Cryptography
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
Introduction to Cryptography for btech cse
PDF
Evolution of Cryptography and Cryptographic techniques
PPTX
My cryptography
PPTX
Lecture 5 - Cryptography.pptx
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PDF
Pertemuan 4 information hiding (cryptography)
PDF
Analysis of Cryptography Techniques
PPT
Elementry Cryptography
PPTX
PDF
Pertemuan 4 information hiding (cryptography)
PPTX
Cryptography
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPTX
Cryptography
Cryptography, a science of secure writing
Er. Sanjeev Raaz
Cryptography : The Art of Secured Messaging
Cryptography by Durlab Kumbhakar
Overview Of Cryptography
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Introduction to Cryptography for btech cse
Evolution of Cryptography and Cryptographic techniques
My cryptography
Lecture 5 - Cryptography.pptx
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
Pertemuan 4 information hiding (cryptography)
Analysis of Cryptography Techniques
Elementry Cryptography
Pertemuan 4 information hiding (cryptography)
Cryptography
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Cryptography

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Cryptography

  • 1. ‘’ The Science of encrypTion ’’
  • 2. What is cryptography ? • Why cryptography is important ?
  • 3. Contents • The purpose of cryptography • History of cryptography and cryptanalysis • Modern cryptography(Types of Algorithms) - Secret Key Cryptography - Hash Functions - Public Key Cryptography - Why Three Encryption Techniques? - The Significance of Passwords & Password Security • Conclusion
  • 4. THE PURPOSE OF CRYPTOGRAPHY Specific security requirements for communication: Data transfer and telecommunication Science of communications code Computer writing in secret  Authentication:  Privacy/confidentiality:  Integrity:  Non-repudiation:
  • 5. HISTORY OF CRYPTOGRAPHY The history of cryptography can be divided into two parts: (1) From ancient civilizations to the 19th century and the first part of the 20th century, (2) Use of encrypting electro-mechanical machines, around the period of the WW II.
  • 6. HISTORY OF CRYPTOGRAPHY Cryptography was used in three kinds of contexts in Cryptography:: ancient times  Private communications Greek κρυπτός, kryptos,  Art and religion "hidden, secret"  Military and diplomatic use
  • 7. MODERN CRYPTOGHRAPHY Here we have three types of algorithms that we can talk about:  Secret Key Cryptography  Hash Functions  Public Key Cryptography
  • 9. SECRET KEY CRYPTOGHRAPHY  Secret Key(Symmetric) Cryptography uses a single key for both encryption and decryption.
  • 10. SECRET KEY CRYPTOGHRAPHY  A single key is used  Sender uses the key to encrypt  Receiver uses the same key to decrypt  Key must be known to both the sender and the receiver  The difficulty is the distribution of the key
  • 11. SECRET KEY CRYPTOGHRAPHY Secret key cryptography algorithms that are in use today :  Data Encryption Standard (DES):  Advanced Encryption Standard (AES):  International Data Encryption Algorithm (IDEA):
  • 13. HASH FUNCTIONS  Hash functions(One-way cryptography) have no key since plaintext cannot be recovered from the ciphertext.
  • 14. HASH FUNCTIONS  Called message compiler and one-way encryption  No key is used  Digital fingerprint  Provide the integrity
  • 15. HASH FUNCTIONS Hash algorithms that are in common use today:  Message Digest (MD) algorithms:  HAVAL (Hash of Variable Length):  Tiger:
  • 16. PUBLIC KEY CRYPTOGHRAPHY  Public Key(Asymmetric) Cryptography. Two keys are used. One for encryption, one for decryption.
  • 17. PUBLIC KEY CRYPTOGHRAPHY  Developed in the last 300-400 years.  Martin Hellman and graduate student Whitfield Diffie  A two-key crypto system  Mathematical functions
  • 18. PUBLIC KEY CRYPTOGHRAPHY Mathematical Functions :  Multiplication vs. factorization:  Exponentiation vs. logarithms:
  • 21. Why Three Encryption Techniques?  Why are there so many different types of cryptographic schemes?  Why can't we do everything we need with just one ?
  • 22. THE SIGNIFICANCE OF PASSWORDS  Every password can be decyrpted.  In cryptography, size does matter.
  • 23. How to create & use strong Passwords
  • 24. How to create & use strong Passwords  Use lengthy passwords. THANK YOU symbols.  Combine letters, numbers, and FOR LISTENING TO US (:  Use words and phrases.