SlideShare a Scribd company logo
Cryptography
INTRODUCTION
 the practice and study of techniques for constructing
and analyzing protocols that overcome the influence
of adversaries and which are related to various aspects
in information such as data confidentiality data
integrity and authentication
 Applications of cryptography include ATM cards,
computer passwords, and electronic commerce
REQUIREMENTS OF A
SECURE NETWORKS
 Authentication: The process of proving one's
identity. (The primary forms of host-to-host
authentication on the Internet today are name-based
or address-based, both of which are notoriously weak.)
 Privacy/confidentiality: Ensuring that no one can
read the message except the intended receiver.
 Integrity: Assuring the receiver that the received
message has not been altered in any way from the
original.
 Non-repudiation: A mechanism to prove that the
sender really sent this message
WORKING OF CRYPTOGRAPHY
OLDEST CRYPTOGRAPHY MACHINE
COMPUTER ERA
 The development of digital computers and electronics
after WWII made possible much more complex
ciphers. Furthermore, computers allowed for the
encryption of any kind of data
 Represent able in any binary format, unlike classical
ciphers which only encrypted written language texts;
this was new and significant. Computer use has thus
supplanted linguistic cryptography, both for cipher
design and cryptanalysis.
TYPES OF CRYPTOGRAPHY
SECRET KEY CRYPTOGRAPHY
 Uses a single key for both encryption and decryption
 With this type of cryptography, both the sender and
the receiver know the same secret code, called the key
 This method works well if you are communicating
with only a limited number of people, but it becomes
impractical to exchange secret keys with large
numbers of people. In addition, there is also the
problem of how you communicate the secret key
securely.
PUBLIC KEY CRYPTOGRAPHY
 Uses one key for encryption and another for
decryption.
 uses a pair of keys for encryption and decryption
 The public key can be freely distributed without
compromising the private key, which must be kept
secret by its owner.
HASH FUNCTION CRYPTOGRAPHY
 A hash function is any algorithm or subroutine that
maps large data cells, called keys, to smaller data sets.
For example, a single integer can serve as an index to
an array.
 Hash functions are mostly used to accelerate table
lookup or data comparison tasks such as finding items
in database, detecting duplicated or similar records in
a large file, finding similar stretches in DNA
sequences, and so on.
PURPOSE OF CRYPTOGRAPHY
 Cryptography is the science of writing in secret code
and is an ancient art; the first documented use of
cryptography in writing dates back to circa 1900 B.C.
 It provides more efficient way of security by encrypting
our data.
 It allows the sender and receiver to communicate more
securily
 It is used in armies from older ages to modern ages. It
allows the armies for exchanging information in the
efficient and secured way.
CONCLUSION
 Some experts argue that cryptography appeared
spontaneously sometime after writing was invented,
with applications ranging from diplomatic missives to
war-time battle plans. It is no surprise, then, that new
forms of cryptography came soon after the widespread
development of computer communications. In data
and telecommunications, cryptography is necessary
when communicating over any untrusted medium,
which includes just about any network, particularly
the Internet.

More Related Content

PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptanalysis 101
PPTX
Cryptography
Cryptography
Cryptography
Cryptography
Cryptography
Introduction to Cryptography
Cryptography.ppt
Cryptanalysis 101
Cryptography

What's hot (20)

PPTX
cryptography
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPTX
Digital signature
PPTX
Introduction to Cryptography
PPT
Cryptography ppt
PPT
Fundamentals of cryptography
PDF
Applied Cryptography
PPTX
Cryptography
PDF
Asymmetric Cryptography
PPTX
Cryptography
PPTX
Cryptography.ppt
PPT
Network Security and Cryptography
PPTX
Intro to modern cryptography
PPTX
Cryptography - Block cipher & stream cipher
PPTX
cryptography ppt free download
PPTX
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Cryptography and network security
cryptography
Cryptography
Cryptography and Network Security
Digital signature
Introduction to Cryptography
Cryptography ppt
Fundamentals of cryptography
Applied Cryptography
Cryptography
Asymmetric Cryptography
Cryptography
Cryptography.ppt
Network Security and Cryptography
Intro to modern cryptography
Cryptography - Block cipher & stream cipher
cryptography ppt free download
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography and network security
Ad

Viewers also liked (20)

PPT
Cryptography and Message Authentication NS3
PPTX
Substitution Cipher
PDF
symmetric key encryption algorithms
PPTX
Substitution cipher
PPT
Public key cryptography and RSA
KEY
Alice & bob public key cryptography 101
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PDF
CNIT 141: 9. Elliptic Curve Cryptosystems
PPTX
Information and data security block cipher and the data encryption standard (...
PPT
Ch03 block-cipher-and-data-encryption-standard
PDF
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
KEY
Alice & bob public key cryptography 101
PPTX
Different types of Symmetric key Cryptography
PPTX
Block cipher modes of operation
PPTX
Information and data security block cipher operation
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Cipher techniques
Cryptography and Message Authentication NS3
Substitution Cipher
symmetric key encryption algorithms
Substitution cipher
Public key cryptography and RSA
Alice & bob public key cryptography 101
Block Cipher Modes of Operation And Cmac For Authentication
CNIT 141: 9. Elliptic Curve Cryptosystems
Information and data security block cipher and the data encryption standard (...
Ch03 block-cipher-and-data-encryption-standard
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Alice & bob public key cryptography 101
Different types of Symmetric key Cryptography
Block cipher modes of operation
Information and data security block cipher operation
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cipher techniques
Ad

Similar to Cryptography (20)

PDF
Survey Paper: Cryptography Is The Science Of Information Security
PPTX
Cryptography
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPTX
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
PPTX
Introduction to Cryptography for btech cse
PPTX
Cryptography, a science of secure writing
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PPT
Cryptography - An Overview
PPTX
Cryptography & Network Security.pptx
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPTX
CN GP 4 Cryptogaraphy.pptx
PPTX
Cryptography and Network Security Principles.pptx
PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PPTX
groupWork.pptx
PPTX
PRESENTATION ON CRYPTOGRAPHY.pptx
Survey Paper: Cryptography Is The Science Of Information Security
Cryptography
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
Introduction to Cryptography for btech cse
Cryptography, a science of secure writing
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
Cryptography - An Overview
Cryptography & Network Security.pptx
CSE-CRYPTOGRAPHY-presentation-in-ppt format
CN GP 4 Cryptogaraphy.pptx
Cryptography and Network Security Principles.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
groupWork.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx

Cryptography

  • 2. INTRODUCTION  the practice and study of techniques for constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information such as data confidentiality data integrity and authentication  Applications of cryptography include ATM cards, computer passwords, and electronic commerce
  • 3. REQUIREMENTS OF A SECURE NETWORKS  Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)  Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.  Integrity: Assuring the receiver that the received message has not been altered in any way from the original.  Non-repudiation: A mechanism to prove that the sender really sent this message
  • 6. COMPUTER ERA  The development of digital computers and electronics after WWII made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data  Represent able in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. Computer use has thus supplanted linguistic cryptography, both for cipher design and cryptanalysis.
  • 8. SECRET KEY CRYPTOGRAPHY  Uses a single key for both encryption and decryption  With this type of cryptography, both the sender and the receiver know the same secret code, called the key  This method works well if you are communicating with only a limited number of people, but it becomes impractical to exchange secret keys with large numbers of people. In addition, there is also the problem of how you communicate the secret key securely.
  • 9. PUBLIC KEY CRYPTOGRAPHY  Uses one key for encryption and another for decryption.  uses a pair of keys for encryption and decryption  The public key can be freely distributed without compromising the private key, which must be kept secret by its owner.
  • 10. HASH FUNCTION CRYPTOGRAPHY  A hash function is any algorithm or subroutine that maps large data cells, called keys, to smaller data sets. For example, a single integer can serve as an index to an array.  Hash functions are mostly used to accelerate table lookup or data comparison tasks such as finding items in database, detecting duplicated or similar records in a large file, finding similar stretches in DNA sequences, and so on.
  • 11. PURPOSE OF CRYPTOGRAPHY  Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C.  It provides more efficient way of security by encrypting our data.  It allows the sender and receiver to communicate more securily  It is used in armies from older ages to modern ages. It allows the armies for exchanging information in the efficient and secured way.
  • 12. CONCLUSION  Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.