SlideShare a Scribd company logo
C r y p t o g r a p h y
Presented by… Saumil Patel
Divyarajsinh Vaghela
Richa Raval
Milan Patel
History and
Introduction of
Cryptography
-Richa Raval
C R Y P T O G R A P H Y
An art of making and solving codes…
What is Cryptography?
C R Y P T O G R A P H Y
What was the need to invent Cryptography?
For Secure Communication…
C R Y P T O G R A P H Y
Hacker
C R Y P T O G R A P H Y
Key Words
 Plain Text :- It is the simple text.
 Cipher Text :- It is the coded text.
 Encryption :- Converting plain text into
Cipher text.
 Decryption :- Converting back from Cipher
text into Plain text.
(Ex. Hello)
(Ex. lkjne)
C R Y P T O G R A P H Y
Defination
It is the practice and study of
techniques for secure
communication of data.
This system is called Cryptosystem.
of
Ancient History
Pioneer of Cryptography :- Julius Caesar
Birth :- 100 BC
Country :- Rome
Invention :- Shift Cipher method
Ancient History
 Started in Egypt in 3000 B.C.
 They found it very complicate due to
insufficient knowledge of Mathematics
& Cryptography.
 Finally they had to stop it…
Ancient History
 Weakness of Shift Cipher :- Any one can decrypt it easily
 Well known example of…
Mary Queen of Scot
Queen Elizabeth I
c
c
Modern History
(Zimmermann’s Telegram)
Sent by Arthur Zimmermann, the
foreign secretary of Germany on
11/01/1917.
United States entered into
World War - I
It was intercepted and decoded
by British Intelligence.
In 20th Century…
Invented by Arthur Scherbius at
the end of World War I.
Intention:- To Encode and decode
of Ciphers.
 Adopted by Military and Govt.
First broken by Polish Cipher
Bureau in Dec.1932 by using
Theoretical Mathematics and
Reverse Engineering.
Enigma Machine
In 21th Century…
After the end of World War II, the Encryption
and Decryption has shifted from ….
In 21th Century…
Parallel to the development of…
…advance methods in Cryptography were developed.
Shift Cipher
DES Cipher RSA Cipher
Permutation Cipher
DH Secret key exchange method
Ceasar Cipher/
Shift Cipher Method
-Saumil Patel
Indian Army
Pakistan Army
ATTACK AT
5 P.M.
DWWDFND
WILYHSP
DWWDFND
WILYHSP
ATTACK AT
5 P.M.
?
How did they do it…???
They use a method called…
CEASAR CIPHER
CEASAR CIPHER
 One of the simplest and widely known
encryption technique.
 Named after Julius Caesar.
 He used it in his private
communication.
 This method is also known as
Shift Cipher or Ceaser’s Code.
CEASAR CIPHER
CEASAR CIPHER
How to convert a text into Cipher Code?
Step -1 :- Remove space, comma(,) , dot(.), “ “,
etc.
and write a simple sentence.
Step -2 :- Replace numbers by alphabets.
ex. 5  FIVE
Step -3 :-Replace each alphabet by a definite shift.
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -1 :- Remove space, comma(,) , dot(.), “ “,
etc.
and write a simple sentence.
 ATTACKAT5PM
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
 ATTACKAT5PM
Step -2 :- Replace numbers by alphabets.
 ATTACKATFIVEPM
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -3 :-Replace each alphabet by a definite shift.
Plain Text :A T T A C K A T F I V E P M
Cipher Text :D W W D F N D W I L Y H S P
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Cipher Text: DWWDFNDWILYHSP
Cipher Disk &
Permutation Method
-Divyarajsinh Vaghela
Cipher Disk
 Enciphering & Deciphering tool.
 Developed by Italian Architect
Leon Battista Alberti in 1470.
 It Consist of two concentric disk.
1) Large :- Stationary
2) Small :- Movable
Cipher Disk
Plain TextCipher
Text
Cipher Disk
 How Cipher Disk is Useful ?
Disadvantage of Shift Cipher method is that
there are only 25 different possibilities for
each alphabet.
Cipher Disk is useful to decrypt the Cipher
code very quickly.
Permutation Cipher
 It is one of the most advance methods used
now a days.
What is the advantage to use Permutation Cipher?
 It is next to impossible to decrypt the code
encrypted by Permutation Cipher.
Permutation Cipher
* Method to create Permutation Cipher Code:-
Step-1 :- Write all the alphabets in a row for the
plain text.
Step-2 :- Randomly choose any of the 26 alphabets
for each alphabet of the plain text.
Ex. For A choose N, For B choose W, etc…
Permutation Cipher
P E Z R N H I M A W F O B G V Y L D K C J Q S U T X
Permuted Alphabet
Permutation Cipher
Ex. ATTACK AT 5 P.M.
 A T T A C K A T F I V E P M
P PCC Z F P CHAQ N Y B
Permutation Cipher
ATTACK AT 5 P.M. PCCPZFPCHAQNYB
PCCPZFPCHAQNYB
Applications &
Importance of
Cryptography
- Milan Patel
 Cryptography plays an important role in
many IT applications !
HOW..???
Let’s see an overview…
Strong Authentication
 Cryptography plays an important role in
Identity Management.
There are many methods from…
to
Strong Authentication
OTP tokens
( One Time Password Generating tokens)
- Popular solution for securing
authentication.
- Widely used in Banks.
- Manufactured by RSA,
VASCO, Codes, etc.
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
 To access e-banking site.
 To secure online credit card transaction.
 For secure email messaging.
 File sharing.
TLS protocol
Strong Authentication
(Transport Layer Security)
- Most widely used protocol.
- Ex. Certificate for server authentication.
Wireless Communication
Why use Cryptography for Wireless Communication ?
Because…
-It is very easy for any one to hack any wireless
communication than an wired communication.
-All that required are only laptop and an antenna..!
Wireless Communication
 It is the most widely used standard for wireless
networking today.
 Cryptography plays an important role in Wi-fi in two
ways…
1) Securing data transmission
2) End point authentication
Wireless Communication
 It is designed to enable wireless data exchange over
short distance.
 Cryptography plays an important role in Bluetooth in
two aspect :-
1) Confidentially
2) Authentication (called pairing)
Every person in this world is related to
CRYPTOGRAPHY…!
Communication Technology
Cyber Security
CRYPTOGRAPHY
Cryptography

More Related Content

PPT
enigma cipher machine
PPTX
Presentación1
PPTX
A TLS Story
PPT
History of cryptography
PPT
The Engima Cipher
PDF
Security Systems for Digital Data - Paper
PPT
Security Systems for Digital Data
PPT
Fundamentals of cryptography
enigma cipher machine
Presentación1
A TLS Story
History of cryptography
The Engima Cipher
Security Systems for Digital Data - Paper
Security Systems for Digital Data
Fundamentals of cryptography

Similar to Cryptography (20)

PPTX
Cryptography, Cryptology, Encryption and types
PPT
Computer systems security 7-cryptography.ppt
PPTX
Cryptography & Steganography
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PPTX
Introduction to Cryptography
PDF
Computer Security Chapter III.pdf
PPTX
Cryptography and network security Nit701
PPTX
Information system security Unit 2.pptx
PPT
7-cryptography in mobile security in network
PPT
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
PPT
Computer security communication networking cryptography .ppt
PPT
introduction to cryptography and its basic techniques
PPT
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
PPT
computer literacy works papers and pencil ew 9-crypt.ppt
PPT
Chaos based cryprography - encryption & hash function
PPTX
Symmetric Encryption Techniques
PPT
the art of the fking dum crypto_basic.ppt
PPT
7-cryptography.ppt
PPT
This is the presentation ofcryptography.ppt
PPT
7-cryptography.pptfffffffffffffffffffffffffffffffffff
Cryptography, Cryptology, Encryption and types
Computer systems security 7-cryptography.ppt
Cryptography & Steganography
Cryptography.pptxhis document provides an overview of cryptography. It define...
Introduction to Cryptography
Computer Security Chapter III.pdf
Cryptography and network security Nit701
Information system security Unit 2.pptx
7-cryptography in mobile security in network
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
Computer security communication networking cryptography .ppt
introduction to cryptography and its basic techniques
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
computer literacy works papers and pencil ew 9-crypt.ppt
Chaos based cryprography - encryption & hash function
Symmetric Encryption Techniques
the art of the fking dum crypto_basic.ppt
7-cryptography.ppt
This is the presentation ofcryptography.ppt
7-cryptography.pptfffffffffffffffffffffffffffffffffff
Ad

Recently uploaded (20)

PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Trump Administration's workforce development strategy
PDF
Empowerment Technology for Senior High School Guide
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Weekly quiz Compilation Jan -July 25.pdf
Computer Architecture Input Output Memory.pptx
What if we spent less time fighting change, and more time building what’s rig...
Chinmaya Tiranga quiz Grand Finale.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Hazard Identification & Risk Assessment .pdf
B.Sc. DS Unit 2 Software Engineering.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Trump Administration's workforce development strategy
Empowerment Technology for Senior High School Guide
Unit 4 Computer Architecture Multicore Processor.pptx
Complications of Minimal Access-Surgery.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Environmental Education MCQ BD2EE - Share Source.pdf
Ad

Cryptography

Editor's Notes

  • #2: <number>
  • #43: <number>