SlideShare a Scribd company logo
JAYAWANT SHIKSHAN PRASARAK MANDAL’s
BHIVARABAI SAWANT INSTITUTE OF
TECHNOLOGY & RESEARCH
Wagholi, Pune-412207
Department of Computer Engineering
Seminar & Technical Communication
“CRYPTOGRAPHY”
Name of student: Kamble Omkar Dnyaneshwar
Roll no: 26
Name of Guide: Prof. Priya Sharma
Academic year: 2022-23
CRYPTO
GRAPHY
CRYPTO
GRAPHY
A presentation on cryptography and its elements.
CONTENTS OF THIS SLIDE
o Introduction
o What is Cryptography?
o Implementation Of cryptography
o Architecture of cryptography
o Types of Cryptography
o Types Of cryptography Algorithms
o Conclusion
INTRO
DUCTION
● The Internet or the global Internet is the internationally
connected network of computer networks with
addresses that are administrated by IANA (Internet
address and Naming Authority).
● There are many aspects to security and many
applications, ranging from secure commerce and
payments to private communications and protecting
passwords. One essential aspect for secure
communications is that of cryptography.
INTRODUCTION
WHAT IS
CRYPTOGRAPHY
o Cryptography derived its name from a Greek word called
“krypto’s” which means “Hidden Secrets” and graphikos,
meaning "written“.
o Cryptography is the practice and study of hiding information.
o It is the Art or Science of converting a plain intelligible data
into an unintelligible data and again retransforming that
message into its original form.
o It provides Confidentiality, Integrity, and Accuracy.
IMPLEMEN
TATION
o Authentication: The process of proving one's
identity. (The primary forms of host-to-host
authentication on the Internet today are name-
based or address-based, both of which are
notoriously weak.)
o Privacy/confidentiality: Ensuring that no one can
read the message except the intended receiver.
o Integrity: Assuring the receiver that the received
message has not been altered in any way from the
original.
o Non-repudiation: A mechanism to prove that the
sender really sent this message.
CRYPTOGRAPHY
ARCHITECTURE
CRYPTOGRAPHY
ARCHITECTURE
TYPES OF
CRYPTO
GRAPHY
CRYPTOGRAPHY
SYMMETRIC
ENCRYPTION
ASYMMETRIC
ENCRYPTION
HASH FUNCTION
Symmetric-key Algorithms/
Secret-key Algorithm
Symmetric-key Algorithms/
Secret-key Algorithm
o Providing data confidentiality by using the same key for
encrypting and decrypting data.
o Providing Message Authentication Codes (MACs) for
source and integrity authentication services. The key is
used to create the MAC and then to validate it.
o Establishing keys during key-establishment processes
o Generating deterministic random numbers
Asymmetric-key algorithms /
public-key algorithms
Asymmetric-key algorithms /
public-key algorithms
o Computing digital signatures
o Establishing cryptographic keying material
o Identity Management
Hash functions
o Providing source and integrity authentication services by
generating message authentication codes (MACs)
o Compressing messages for generating and verifying
digital signatures
o Deriving keys in key-establishment algorithms
o Generating deterministic random numbers
PROS
AND
CONS
PROS :
o Confidentiality - An encryption method can protect data and
communications against unauthorized access and disclosure.
o Authentication - Information can be safeguarded against spoofing
and forgeries using cryptographic techniques like MAC and digital
signatures, which are used for authentication.
o Data Integrity - Cryptographic hash functions are essential in giving
users confidence in the accuracy of their data.
o Non-repudiation - A digital signature offers the non-repudiation
service to protect against disputes that can develop if the sender
refuses to acknowledge receipt of the communication.
•Even an authorized user may find it challenging to access strongly encrypted, authenticated,
and password-protected information at a time when access is vital for decision-making.
•Cryptography cannot guarantee high availability, one of the core components of
information security.
•Selective access control, another essential requirement of information security, also cannot
be met by using cryptography. For the same, administrative controls and processes must be
used.
•The dangers and weaknesses that result from the shoddy systems, methods, and procedures
are not protected by cryptography.
•Cryptography is not free. Costs include both time and money.
• Information processing is delayed when encryption mechanisms are added.
• Public key infrastructure must be built up and maintained in order to employ public
key cryptography, which needs substantial financial investment.
CONS :
CONCLUSION
CONCLUSION
o We use different types of algorithms to establish
security services in different service mechanisms.
o We use either private key cryptography or public key
cryptography according to requirement.
o If we want to send message quickly we use private
key algorithm and if we want to send messages
secretly we use public key algorithm.
THANK
YOU

More Related Content

PPTX
OSI Model
PPTX
La sécurité informatique
PPT
Introduction to Digital signatures
PDF
Cyber Security Challenges and Emerging Trends
PPT
Digital Signature
PPTX
Digital Signature.pptx
PPT
IDS and IPS
PPTX
La Sécurité informatiques
OSI Model
La sécurité informatique
Introduction to Digital signatures
Cyber Security Challenges and Emerging Trends
Digital Signature
Digital Signature.pptx
IDS and IPS
La Sécurité informatiques

What's hot (20)

PPT
Cyber crime in a Smart Phone & Social Media Obsessed World
PPTX
Digital signature
PPTX
Encryption
PPTX
Hacking
PPTX
Cybersecurity in the Era of IoT
PDF
configuration vpn-ipsec-routeur
PPT
6. cryptography
PPTX
Cryptography
PPT
Secure Socket Layer
PPTX
Digital certificates
PPTX
Digital signature
PPT
Set Secure Electronic Transaction (SET)
PPTX
Ssl and tls
PPTX
TLS v1.3
PDF
Wireless Networking Security
PPT
Network Security
PPT
PPT
Introduction to Secure Sockets Layer
PPTX
secure socket layer
Cyber crime in a Smart Phone & Social Media Obsessed World
Digital signature
Encryption
Hacking
Cybersecurity in the Era of IoT
configuration vpn-ipsec-routeur
6. cryptography
Cryptography
Secure Socket Layer
Digital certificates
Digital signature
Set Secure Electronic Transaction (SET)
Ssl and tls
TLS v1.3
Wireless Networking Security
Network Security
Introduction to Secure Sockets Layer
secure socket layer
Ad

Similar to Cryptography (20)

PPTX
IT235 POC - Unit I priciples of cryptography
PPTX
PRESENTATION ON CRYPTOGRAPHY.pptx
PPTX
CN GP 4 Cryptogaraphy.pptx
PPTX
Encryption in Cryptography
PPTX
Cryptography & Network Security.pptx
PDF
Iaetsd a survey on cloud storage security with
PPT
cryptography.ppt.ppt
PPT
cryptography.ppt - Copy.ppt
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
PDF
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
PPT
Cryptography ppt
PPTX
CRYPTOGRAPHY & NETWORK SECURITY.pptx
PDF
Mj3422172221
PPTX
Fundamental Concept of Cryptography in Computer Security
PDF
Achieving data integrity by forming the digital signature using RSA and SHA-1...
PDF
A Survey On The Cryptographic Encryption Algorithms
DOC
Cryptography
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
Design of Hybrid Cryptography Algorithm for Secure Communication
PPTX
Technical Seminar. cryptography ppt for college
IT235 POC - Unit I priciples of cryptography
PRESENTATION ON CRYPTOGRAPHY.pptx
CN GP 4 Cryptogaraphy.pptx
Encryption in Cryptography
Cryptography & Network Security.pptx
Iaetsd a survey on cloud storage security with
cryptography.ppt.ppt
cryptography.ppt - Copy.ppt
Performance Comparison of File Security System using TEA and Blowfish Algorithms
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
Cryptography ppt
CRYPTOGRAPHY & NETWORK SECURITY.pptx
Mj3422172221
Fundamental Concept of Cryptography in Computer Security
Achieving data integrity by forming the digital signature using RSA and SHA-1...
A Survey On The Cryptographic Encryption Algorithms
Cryptography
International Refereed Journal of Engineering and Science (IRJES)
Design of Hybrid Cryptography Algorithm for Secure Communication
Technical Seminar. cryptography ppt for college
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Cryptography

  • 1. JAYAWANT SHIKSHAN PRASARAK MANDAL’s BHIVARABAI SAWANT INSTITUTE OF TECHNOLOGY & RESEARCH Wagholi, Pune-412207 Department of Computer Engineering Seminar & Technical Communication “CRYPTOGRAPHY” Name of student: Kamble Omkar Dnyaneshwar Roll no: 26 Name of Guide: Prof. Priya Sharma Academic year: 2022-23
  • 3. CRYPTO GRAPHY A presentation on cryptography and its elements.
  • 4. CONTENTS OF THIS SLIDE o Introduction o What is Cryptography? o Implementation Of cryptography o Architecture of cryptography o Types of Cryptography o Types Of cryptography Algorithms o Conclusion
  • 6. ● The Internet or the global Internet is the internationally connected network of computer networks with addresses that are administrated by IANA (Internet address and Naming Authority). ● There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. INTRODUCTION
  • 8. o Cryptography derived its name from a Greek word called “krypto’s” which means “Hidden Secrets” and graphikos, meaning "written“. o Cryptography is the practice and study of hiding information. o It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. o It provides Confidentiality, Integrity, and Accuracy.
  • 10. o Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name- based or address-based, both of which are notoriously weak.) o Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. o Integrity: Assuring the receiver that the received message has not been altered in any way from the original. o Non-repudiation: A mechanism to prove that the sender really sent this message.
  • 16. Symmetric-key Algorithms/ Secret-key Algorithm o Providing data confidentiality by using the same key for encrypting and decrypting data. o Providing Message Authentication Codes (MACs) for source and integrity authentication services. The key is used to create the MAC and then to validate it. o Establishing keys during key-establishment processes o Generating deterministic random numbers
  • 18. Asymmetric-key algorithms / public-key algorithms o Computing digital signatures o Establishing cryptographic keying material o Identity Management
  • 19. Hash functions o Providing source and integrity authentication services by generating message authentication codes (MACs) o Compressing messages for generating and verifying digital signatures o Deriving keys in key-establishment algorithms o Generating deterministic random numbers
  • 21. PROS : o Confidentiality - An encryption method can protect data and communications against unauthorized access and disclosure. o Authentication - Information can be safeguarded against spoofing and forgeries using cryptographic techniques like MAC and digital signatures, which are used for authentication. o Data Integrity - Cryptographic hash functions are essential in giving users confidence in the accuracy of their data. o Non-repudiation - A digital signature offers the non-repudiation service to protect against disputes that can develop if the sender refuses to acknowledge receipt of the communication.
  • 22. •Even an authorized user may find it challenging to access strongly encrypted, authenticated, and password-protected information at a time when access is vital for decision-making. •Cryptography cannot guarantee high availability, one of the core components of information security. •Selective access control, another essential requirement of information security, also cannot be met by using cryptography. For the same, administrative controls and processes must be used. •The dangers and weaknesses that result from the shoddy systems, methods, and procedures are not protected by cryptography. •Cryptography is not free. Costs include both time and money. • Information processing is delayed when encryption mechanisms are added. • Public key infrastructure must be built up and maintained in order to employ public key cryptography, which needs substantial financial investment. CONS :
  • 24. CONCLUSION o We use different types of algorithms to establish security services in different service mechanisms. o We use either private key cryptography or public key cryptography according to requirement. o If we want to send message quickly we use private key algorithm and if we want to send messages secretly we use public key algorithm.