SlideShare a Scribd company logo
2
Most read
3
Most read
16
Most read
Cryptography
Source: Content by William Stallings,
Lawrie Brown ,Triad Ltd.
Introduction to Cryptography
 Cryptography is the practice and study of techniques for
securing communication and data by converting
messages into format not understandable by
unauthenticated users.
Terms:
Plain text-Understandable message
Cipher – Algorithm to convert plain text to cipher text
Cipher text- Scramble form of message only understandable
by authenticated users
Example of Cryptography
 Suppose you want to send Message –Hello
If shift cipher is used for cryptography ,then it shift each
character by key value
 Assume key =3
 For Encryption
Plain text enryptedcipher text
Hello->Khoor(added key of 3 to each char)
 For Decryption
Cipher text decrypted Plaintext
KhoorHello(sub key-3 )
Encryption
Encryption is a way of converting data from plaintext to
cipher text so that unauthorized parties cannot understand
the information.
Source:https://www.nodejsera.com/assets/img/encrypt.jpg
Decryption
 Decryption is the process of converting ciphertext
toplaintext.
Source:https://www.nodejsera.com/assets/img/Decrypt.png
Types of Cryptography
 Private or Symmetric key cryptography
 Public or Asymmetric key cryptography
Private Key cryptography also called as symmetric
key cryptography.In symmetric-key cryptography,
the same key is used by the sender(for encryption)
and the receiver (for decryption).
The key is shared.
Algorithm: DES,3DES
Private Key cryptography
Private-Key Cryptography
 traditional private/secret/single key cryptography uses
one key
 Same Key is shared by both sender and receiver
 Sender uses this key and encryption algorithm to
encrypt data
 Receiver uses this key and decryption algorithm to
decrypt data
 if this key is disclosed communications are compromised
 also is symmetric, parties are equal
 hence does not protect sender from receiver forging a
message & claiming is sent by sender
Private-key cryptography
Private-key cryptography
 Advantages:
 Simple
 Faster
 Disadvantages:
 Key must exchanges in secure way
 Easy for hacker to get a key as it is passed in unsecure
way.
An asymmetric-key (or public-key) cipher uses two
keys: one private (To encrypt data) and one public(To
decrypt data).
Asymmetric-key(Public key) cryptography
Public-Key Cryptography?
 developed to address two key issues:
 key distribution – how to have secure communications
 digital signatures – how to verify a message comes intact from the claimed
sender
 public invention due to Whitfield Diffie & Martin Hellman at Stanford Uni
in 1976
 known earlier in classified community
 Asymmetric encryption use two keys, one to
encrypt the data, and another key to decrypt the
data.
 These keys are generated together
 One is named as Public key and is distributed
freely. The other is named as Private Key and it
is kept hidden.
 Both Sender & Recipient has to share their
Public Keys for Encryption and has to use their
Private Keys for Decryption.
Public-key cryptography
 Asymmetric encryption use two keys:
Public Key - to encrypt the data
Private Key - to decrypt the data
 These keys are generated together.
 The Public key(s) is distributed freely between the sender and
receiver.
 The other is named as Private Key and it is kept hidden.
 The Private Key is only used for Decryption and will not be shared
between the sender and receiver.
Key Points in Asymmetric Encryption
Merits:
 Two parties don't need to have their private keys already shared in order to
communicate using encryption.
 Authentication and Non-Repudiation are possible. (Authentication means that you can
encrypt the message with my public key and only I can decrypt it with my private key.
Non-repudiation means that you can "sign" the message with your private key and I can
verify that it came from you with your public key.)
De-Merits:
Asymmetric Encryption algorithms are comparatively complex.
Time consuming process for Encryption and Decryption.
MERITS & DE-MERITS
Public-Key Cryptography
Applications
 can classify uses into 3 categories:
 encryption/decryption (provide secrecy)
 digital signatures (provide authentication)
 key exchange (of session keys)
 some algorithms are suitable for all uses, others are specific to one
cryptography
Comparison between two categories of cryptography

More Related Content

PPTX
Captcha seminar
PDF
Gradient descent method
PPTX
Gradient descent optimizer
PDF
Generative AI
PDF
Introduction to python programming
PPTX
Types of attacks
PPTX
Metasploit
Captcha seminar
Gradient descent method
Gradient descent optimizer
Generative AI
Introduction to python programming
Types of attacks
Metasploit

What's hot (20)

DOCX
S/MIME
PPTX
Encryption and Decryption
PPTX
Kerberos
PPTX
Digital signature
PPT
Digital Signature
PPT
DES (Data Encryption Standard) pressentation
PPT
Email security
PPTX
Network security
PPTX
cryptography
PPT
Encryption And Decryption
 
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Cryptography.ppt
PPT
Pretty good privacy
PPT
block ciphers
PPTX
Data encryption
PPTX
Cryptography.ppt
PPT
CONVENTIONAL ENCRYPTION
PPT
Fundamentals of cryptography
PPTX
Key Management and Distribution
PPTX
Cryptography
S/MIME
Encryption and Decryption
Kerberos
Digital signature
Digital Signature
DES (Data Encryption Standard) pressentation
Email security
Network security
cryptography
Encryption And Decryption
 
Cryptography - Block cipher & stream cipher
Cryptography.ppt
Pretty good privacy
block ciphers
Data encryption
Cryptography.ppt
CONVENTIONAL ENCRYPTION
Fundamentals of cryptography
Key Management and Distribution
Cryptography
Ad

Similar to cryptography (20)

PDF
UNIT 3 Information Security Sharad Institute
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PPT
DIS- Symmetric and Asymmetric Encryption.ppt
PDF
Analysis of Cryptography Techniques
PPT
Cryptography ppt
PPT
Symmetric and Asymmetric Encryption infosec.ppt
PPTX
Cryptography and Network Security Principles.pptx
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPTX
Introduction to Cryptography for btech cse
PPT
Cryptography
PPTX
Data encryption
PDF
Computer Security (Cryptography) Ch01
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PPTX
Key distribution code.ppt
UNIT 3 Information Security Sharad Institute
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
A Survey on Cryptographic Techniques for Network Security.pdf
DIS- Symmetric and Asymmetric Encryption.ppt
Analysis of Cryptography Techniques
Cryptography ppt
Symmetric and Asymmetric Encryption infosec.ppt
Cryptography and Network Security Principles.pptx
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Introduction to Cryptography for btech cse
Cryptography
Data encryption
Computer Security (Cryptography) Ch01
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Key distribution code.ppt
Ad

More from swatihans (6)

PPTX
heuristic - best search and a*
PPTX
components of computer
PPT
Digital signature
DOCX
telnet ftp email
PPTX
Computer Graphics transformations
PPT
Digital signature
heuristic - best search and a*
components of computer
Digital signature
telnet ftp email
Computer Graphics transformations
Digital signature

Recently uploaded (20)

PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
737-MAX_SRG.pdf student reference guides
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
PPT on Performance Review to get promotions
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PPTX
Current and future trends in Computer Vision.pptx
PPTX
introduction to high performance computing
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPT
Total quality management ppt for engineering students
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Visual Aids for Exploratory Data Analysis.pdf
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
R24 SURVEYING LAB MANUAL for civil enggi
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
737-MAX_SRG.pdf student reference guides
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Safety Seminar civil to be ensured for safe working.
UNIT 4 Total Quality Management .pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPT on Performance Review to get promotions
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Current and future trends in Computer Vision.pptx
introduction to high performance computing
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Total quality management ppt for engineering students
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

cryptography

  • 1. Cryptography Source: Content by William Stallings, Lawrie Brown ,Triad Ltd.
  • 2. Introduction to Cryptography  Cryptography is the practice and study of techniques for securing communication and data by converting messages into format not understandable by unauthenticated users. Terms: Plain text-Understandable message Cipher – Algorithm to convert plain text to cipher text Cipher text- Scramble form of message only understandable by authenticated users
  • 3. Example of Cryptography  Suppose you want to send Message –Hello If shift cipher is used for cryptography ,then it shift each character by key value  Assume key =3  For Encryption Plain text enryptedcipher text Hello->Khoor(added key of 3 to each char)  For Decryption Cipher text decrypted Plaintext KhoorHello(sub key-3 )
  • 4. Encryption Encryption is a way of converting data from plaintext to cipher text so that unauthorized parties cannot understand the information. Source:https://www.nodejsera.com/assets/img/encrypt.jpg
  • 5. Decryption  Decryption is the process of converting ciphertext toplaintext. Source:https://www.nodejsera.com/assets/img/Decrypt.png
  • 6. Types of Cryptography  Private or Symmetric key cryptography  Public or Asymmetric key cryptography
  • 7. Private Key cryptography also called as symmetric key cryptography.In symmetric-key cryptography, the same key is used by the sender(for encryption) and the receiver (for decryption). The key is shared. Algorithm: DES,3DES Private Key cryptography
  • 8. Private-Key Cryptography  traditional private/secret/single key cryptography uses one key  Same Key is shared by both sender and receiver  Sender uses this key and encryption algorithm to encrypt data  Receiver uses this key and decryption algorithm to decrypt data  if this key is disclosed communications are compromised  also is symmetric, parties are equal  hence does not protect sender from receiver forging a message & claiming is sent by sender
  • 10. Private-key cryptography  Advantages:  Simple  Faster  Disadvantages:  Key must exchanges in secure way  Easy for hacker to get a key as it is passed in unsecure way.
  • 11. An asymmetric-key (or public-key) cipher uses two keys: one private (To encrypt data) and one public(To decrypt data). Asymmetric-key(Public key) cryptography
  • 12. Public-Key Cryptography?  developed to address two key issues:  key distribution – how to have secure communications  digital signatures – how to verify a message comes intact from the claimed sender  public invention due to Whitfield Diffie & Martin Hellman at Stanford Uni in 1976  known earlier in classified community
  • 13.  Asymmetric encryption use two keys, one to encrypt the data, and another key to decrypt the data.  These keys are generated together  One is named as Public key and is distributed freely. The other is named as Private Key and it is kept hidden.  Both Sender & Recipient has to share their Public Keys for Encryption and has to use their Private Keys for Decryption.
  • 15.  Asymmetric encryption use two keys: Public Key - to encrypt the data Private Key - to decrypt the data  These keys are generated together.  The Public key(s) is distributed freely between the sender and receiver.  The other is named as Private Key and it is kept hidden.  The Private Key is only used for Decryption and will not be shared between the sender and receiver. Key Points in Asymmetric Encryption
  • 16. Merits:  Two parties don't need to have their private keys already shared in order to communicate using encryption.  Authentication and Non-Repudiation are possible. (Authentication means that you can encrypt the message with my public key and only I can decrypt it with my private key. Non-repudiation means that you can "sign" the message with your private key and I can verify that it came from you with your public key.) De-Merits: Asymmetric Encryption algorithms are comparatively complex. Time consuming process for Encryption and Decryption. MERITS & DE-MERITS
  • 17. Public-Key Cryptography Applications  can classify uses into 3 categories:  encryption/decryption (provide secrecy)  digital signatures (provide authentication)  key exchange (of session keys)  some algorithms are suitable for all uses, others are specific to one
  • 19. Comparison between two categories of cryptography