SlideShare a Scribd company logo
Cryptography
L01- Introduction
outline
 Historically
 What is cryptography
 Cryptography goals
 Cryptography sections
● Encryption
● Decryption
 Cryptography keys and their importance
 Types of Cryptography keys
● public Key
● private key
2
Historically
 Information security is the practice of defending information from
unauthorized access, use, disclosure, disruption, modification,
perusal, inspection, recording or destruction. It is a general term that
can be used regardless of the form the data may take.
 Information security uses cryptography to transform usable
information into a form that renders it unusable by anyone other
than an authorized user; this process is called encryption.
3
What is cryptography
 Known as encryption codes to convert the information is
understandable process , To prevent unauthorized persons from
access to information or misunderstood.
 It uses the science of mathematics is you can store sensitive
information transmitted over insecure networks and secure from
hackers and vandals tamper and thieves.
4
Cryptography goals
 Confidentiality: keeping information secret from all but those who
are authorized to see it.
 Integrity: ensuring information has not been altered by unauthorized
or unknown means.
 Availability: keeping information accessible by authorized users
when required
5
Cryptography goals 6
Confidentiality
Availability Integrity
Cryptography sections
 Encryption :
It is turning information into incomprehensible symbols using encryption
algorithms process.
It includes encryption texts, images, audio, ...
The picture shows texts encryption process:
7
Cryptography sections
 Decryption :
It is the opposite of the encryption process is the conversion of non-
understood codes to understandable using Decryption algorithms
process.
8
Cryptography keys and their
importance
 What is the key?
Is a secret number by the length algorithm type, for example(6-bit)it is
used for the encryption and decryption process.
► What is importance ?
No one can decryption data without the encryption key that has been
done Encryption.
9
Types of Cryptography keys
 Public key :
Is the number that is traded and spread among the rest of the users to
encrypt any information or customized for you e-mails is a public key
based encryption process nor can one decode that information else
you because they need a PIN number Let it is private key to complete
the calculation and access to the key figure basis and thus open the
files again.
10
Types of Cryptography keys
 Private key :
The other half is supplementing public key to get to the base figure
and restore encrypted information to Normal before encryption , and
this is a key characteristic of all people from other users and serve as
an electronic identity enables the owner of any decryption encrypted
information sent to him on the basis of the public key so you must keep
the private key.
11
Example of public key
 In this example it is used by the public key encryption without the
private key in the encryption and decryption process
12
Example of public and private key
 In this example is the use of encryption
by the public and private key where
the public key for all seen while the private
key is not seen.
13
Example of public and private key
 In this example encryption process is done by the public key is not
decryption only by the private key using the public key.
14
In this slide we have talked about the subject of encryption in general
and explain the tools used in encryption ..
In the (L02)we will talk about the types of
encryption depending on the type of the
key And some of the things.
15
Thanks for watching
16

More Related Content

PPTX
Cryptography
PPT
6. cryptography
PPT
Cryptography
PPTX
Cryptography.ppt
PDF
Introduction to Cryptography
PPTX
Encryption
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
Cryptography
Cryptography
6. cryptography
Cryptography
Cryptography.ppt
Introduction to Cryptography
Encryption
What is Asymmetric Encryption? Understand with Simple Examples
Cryptography

What's hot (20)

ODP
Encryption presentation final
PPTX
Cryptography
PPT
Introduction To PKI Technology
PPTX
Cryptography and Network Security
PPTX
Cryptography.ppt
PPTX
Cryptography
PPT
DES (Data Encryption Standard) pressentation
PPTX
cryptography
PPTX
Cryptography and Information Security
PDF
Information Security Cryptography ( L02- Types Cryptography)
PDF
Data Encryption and Decryption using Hill Cipher
PPT
Cryptography
PPTX
Cryptography
PPT
Cryptography
PPTX
Cryptography
PPTX
Hash Function
PPTX
Diffie Hellman Key Exchange
PPT
13 asymmetric key cryptography
PPTX
Kerberos
PPTX
Cryptography
Encryption presentation final
Cryptography
Introduction To PKI Technology
Cryptography and Network Security
Cryptography.ppt
Cryptography
DES (Data Encryption Standard) pressentation
cryptography
Cryptography and Information Security
Information Security Cryptography ( L02- Types Cryptography)
Data Encryption and Decryption using Hill Cipher
Cryptography
Cryptography
Cryptography
Cryptography
Hash Function
Diffie Hellman Key Exchange
13 asymmetric key cryptography
Kerberos
Cryptography
Ad

Viewers also liked (20)

PPT
Wi-Fi
PPTX
Securing data
PDF
Practical Crypto Attacks Against Web Applications
ODP
Pyramid of Cyber Security
PPT
Communication technique
PPTX
PPTX
Cryptography
PPTX
Data encryption
PPTX
Cyber Security
PPTX
Cryptography
PPTX
Encryption
PPTX
Cryptography
PDF
Data Encryption and Decryption using Hill Cipher
PPTX
Carrier Sense Multiple Access (CSMA)
PPT
INDIAN CYBERLAW AND SECURITY
PPT
Wi-Fi vs Bluetooth
PPSX
Cyber crime and cyber security
PPT
Encryption And Decryption
 
PPT
Basic Encryption Decryption Chapter 2
PDF
Wi-Fi
Securing data
Practical Crypto Attacks Against Web Applications
Pyramid of Cyber Security
Communication technique
Cryptography
Data encryption
Cyber Security
Cryptography
Encryption
Cryptography
Data Encryption and Decryption using Hill Cipher
Carrier Sense Multiple Access (CSMA)
INDIAN CYBERLAW AND SECURITY
Wi-Fi vs Bluetooth
Cyber crime and cyber security
Encryption And Decryption
 
Basic Encryption Decryption Chapter 2
Ad

Similar to Information Security Cryptography ( L01- introduction ) (20)

PPTX
encryption.pptx
PPTX
Introduction to Cryptography for btech cse
PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PDF
UNIT 3 Information Security Sharad Institute
PPTX
Overview of cryptography
PPTX
Introduction to cryptography part1-final
PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
PresentationonCRYPTOGRAPHY.pptx
PDF
Analysis of Cryptographic Algorithms for Network Security
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPTX
cryptography ppt free download
PPTX
Cryptography, a science of secure writing
PPTX
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
PDF
cryptography
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
encryption.pptx
Introduction to Cryptography for btech cse
CSE CRYPTOGRAPHY ppt - Copy.pptx
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
UNIT 3 Information Security Sharad Institute
Overview of cryptography
Introduction to cryptography part1-final
Introduction to Cryptography
Cryptography
PresentationonCRYPTOGRAPHY.pptx
Analysis of Cryptographic Algorithms for Network Security
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
cryptography ppt free download
Cryptography, a science of secure writing
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
cryptography
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Modernizing your data center with Dell and AMD
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Reach Out and Touch Someone: Haptics and Empathic Computing
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx

Information Security Cryptography ( L01- introduction )

  • 2. outline  Historically  What is cryptography  Cryptography goals  Cryptography sections ● Encryption ● Decryption  Cryptography keys and their importance  Types of Cryptography keys ● public Key ● private key 2
  • 3. Historically  Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take.  Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. 3
  • 4. What is cryptography  Known as encryption codes to convert the information is understandable process , To prevent unauthorized persons from access to information or misunderstood.  It uses the science of mathematics is you can store sensitive information transmitted over insecure networks and secure from hackers and vandals tamper and thieves. 4
  • 5. Cryptography goals  Confidentiality: keeping information secret from all but those who are authorized to see it.  Integrity: ensuring information has not been altered by unauthorized or unknown means.  Availability: keeping information accessible by authorized users when required 5
  • 7. Cryptography sections  Encryption : It is turning information into incomprehensible symbols using encryption algorithms process. It includes encryption texts, images, audio, ... The picture shows texts encryption process: 7
  • 8. Cryptography sections  Decryption : It is the opposite of the encryption process is the conversion of non- understood codes to understandable using Decryption algorithms process. 8
  • 9. Cryptography keys and their importance  What is the key? Is a secret number by the length algorithm type, for example(6-bit)it is used for the encryption and decryption process. ► What is importance ? No one can decryption data without the encryption key that has been done Encryption. 9
  • 10. Types of Cryptography keys  Public key : Is the number that is traded and spread among the rest of the users to encrypt any information or customized for you e-mails is a public key based encryption process nor can one decode that information else you because they need a PIN number Let it is private key to complete the calculation and access to the key figure basis and thus open the files again. 10
  • 11. Types of Cryptography keys  Private key : The other half is supplementing public key to get to the base figure and restore encrypted information to Normal before encryption , and this is a key characteristic of all people from other users and serve as an electronic identity enables the owner of any decryption encrypted information sent to him on the basis of the public key so you must keep the private key. 11
  • 12. Example of public key  In this example it is used by the public key encryption without the private key in the encryption and decryption process 12
  • 13. Example of public and private key  In this example is the use of encryption by the public and private key where the public key for all seen while the private key is not seen. 13
  • 14. Example of public and private key  In this example encryption process is done by the public key is not decryption only by the private key using the public key. 14
  • 15. In this slide we have talked about the subject of encryption in general and explain the tools used in encryption .. In the (L02)we will talk about the types of encryption depending on the type of the key And some of the things. 15