SlideShare a Scribd company logo
CRYPTOGRAPHY
INTRODUCTION
CATEGORIES OF CRYPTOGRAPHY
CRYPTOGRAPHIC FUNCTIONS
BASIC TERMS
ENCRYPTION & DECRYPTION
SECURITY THREATS
SECURITY GOALS
APPLICATIONS
CONCLUSION
CONTENTS
Cryptography is the science and art of transforming messages
to make them secure and immune to attack.
It comes from Greek word "secret writing"
WHAT IS CRYPTOGRAPHY
Cryptography
CATEGORIES OF CRYPTOGRAPHY
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC KEY
CRYPTOGRAPHY
• Symmetric-key cryptography started thousands of years ago when people
needed to exchange secrets (for example, in a war). We still mainly use
symmetric-key cryptography in our network security. Also known as secret
key
• In symmetric-key cryptography, the same key is used by the sender(for
encryption) and the receiver (for decryption).The key is shared.
SYMMETRIC KEY CRYPTOGRAPHY
• Also known as public key cryptography.
• Sender & receiver uses different keys for encryption &
decryption
ASYMMETRIC KEY CRYPTOGRAPHY
• PLAIN TEXT
• CIPHER TEXT
• CIPHER
• CRYPTOLOGY
• KEY
BASIC TERMS
SECRET KEY FUNCTIONS
• Using a single key for encryption/decryption.
• The plaintext and the cipher text having the same size.
• Also called symmetric key cryptography
PUBLIC KEY FUNCTIONS
• Each individual has two keys
– a private key (d): need not be reveal to anyone
– a public key (e): preferably known to the entire world
• Public key crypto is also called asymmetric crypto.
HASH FUNCTIONS
• A mathematical transformation that takes a message of arbitrary length
and computes it a fixed-length (short) number.
TYPES OF CRYPTOGRAPHIC FUNCTIONS
TRADITIONAL
CIPHERS
SUBSTITUTION
CIPHER
TRANSPOSITION
CIPHER
• A substitution technique is one in which the letters/number/symbols of plaintext
are replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6
SUBSTITUTION CIPHERS
TRANSPOSITION CIPHER
• In the transposition technique the positions of letters/numbers/symbols in
plaintext is changed with one another.
• Plain text: MEET ME AFTER PARTY
• Cipher text: TEMEEMEFAPTRYRAT
• KEY USED: 421635
1 2 3 4 5 6
M E E T M E
A F T E R P
A R T Y
4 2 1 6 3 5
T E M E E M
E F A P T R
Y R A T
ENCRYPTION & DECRYPTION
ENCRYPTION
The process of converting plaintext into cipher text
DECRYPTION
The process of converting cipher text into plaintext
ENCRYPTION & DECRYPTION
THREATS
CONFIDENTIALITY INTEGRITY
SECURE
NON-REPUDIATION
SECURITY GOALS
• Defense services
• Digital Signatures
• Identification and Authentication
• Internet payment systems
• E- Commerce
• Access control
• Data security
APPLICATIONS
By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access
control and availability of data is maintained.
CONCLUSION
Cryptography

More Related Content

PPTX
Cryptography
PDF
basic encryption and decryption
PPTX
Cryptography
PPT
overview of cryptographic techniques
PPTX
Applications of-linear-algebra-hill-cipher
PPT
Cryptography
PPT
Chguatda.com/cmx.p02...1
PDF
Information Security Cryptography ( L03- Old Cryptography Algorithms )
Cryptography
basic encryption and decryption
Cryptography
overview of cryptographic techniques
Applications of-linear-algebra-hill-cipher
Cryptography
Chguatda.com/cmx.p02...1
Information Security Cryptography ( L03- Old Cryptography Algorithms )

What's hot (20)

PPTX
Cryptography
PPTX
Cryptography and Information Security
PPTX
Cryptography
PPTX
Product Cipher
PPTX
Substitution techniques
PPTX
Cryptography
PPTX
Cryptography
PPTX
Caesar cipher
PDF
Introduction to Cryptography Part I
PDF
Chapter 8 cryptography lanjutan
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PDF
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
PPT
Cryptography - An Overview
PDF
Pertemuan 7 cryptography
PPTX
Symmetric ciphermodel
PPT
Cryptography & network security
PPTX
Symmetric Encryption Techniques
PPTX
Classical encryption techniques
PDF
Introduction to Cryptography
Cryptography
Cryptography and Information Security
Cryptography
Product Cipher
Substitution techniques
Cryptography
Cryptography
Caesar cipher
Introduction to Cryptography Part I
Chapter 8 cryptography lanjutan
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Cryptography - An Overview
Pertemuan 7 cryptography
Symmetric ciphermodel
Cryptography & network security
Symmetric Encryption Techniques
Classical encryption techniques
Introduction to Cryptography
Ad

Similar to Cryptography (20)

PPTX
Cryptography ppt by vaishnavi khandelwal
PDF
Presentation on Cryptography
PPTX
Cryptography
PPTX
Cryptography.ppt
PPTX
Basics of Cryptography presentation.pptx
DOCX
Cryptography- "A Black Art"
PPT
Lecture 11
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Cryptography by manisha jha
PDF
Encryption
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPS
Criptography
PPTX
Cryptography by Durlab Kumbhakar
PDF
Pertemuan 4 information hiding (cryptography)
PPTX
4.IS@Mohsin.pptx........................
PDF
Survey Paper: Cryptography Is The Science Of Information Security
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PDF
Pertemuan 4 information hiding (cryptography)
PPT
Fundamentals of cryptography
PPTX
Introduction to Cryptography for btech cse
Cryptography ppt by vaishnavi khandelwal
Presentation on Cryptography
Cryptography
Cryptography.ppt
Basics of Cryptography presentation.pptx
Cryptography- "A Black Art"
Lecture 11
Cryptography and Network Security Principles.pptx
Cryptography by manisha jha
Encryption
Detailed description about the concept of E Commerce UNIT IV.pptx
Criptography
Cryptography by Durlab Kumbhakar
Pertemuan 4 information hiding (cryptography)
4.IS@Mohsin.pptx........................
Survey Paper: Cryptography Is The Science Of Information Security
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Pertemuan 4 information hiding (cryptography)
Fundamentals of cryptography
Introduction to Cryptography for btech cse
Ad

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
project resource management chapter-09.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
1. Introduction to Computer Programming.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Programs and apps: productivity, graphics, security and other tools
gpt5_lecture_notes_comprehensive_20250812015547.pdf
project resource management chapter-09.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
STKI Israel Market Study 2025 version august
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Getting Started with Data Integration: FME Form 101
1. Introduction to Computer Programming.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
The various Industrial Revolutions .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Tartificialntelligence_presentation.pptx
Enhancing emotion recognition model for a student engagement use case through...
OMC Textile Division Presentation 2021.pptx
cloud_computing_Infrastucture_as_cloud_p
TLE Review Electricity (Electricity).pptx
Group 1 Presentation -Planning and Decision Making .pptx

Cryptography

  • 2. INTRODUCTION CATEGORIES OF CRYPTOGRAPHY CRYPTOGRAPHIC FUNCTIONS BASIC TERMS ENCRYPTION & DECRYPTION SECURITY THREATS SECURITY GOALS APPLICATIONS CONCLUSION CONTENTS
  • 3. Cryptography is the science and art of transforming messages to make them secure and immune to attack. It comes from Greek word "secret writing" WHAT IS CRYPTOGRAPHY
  • 5. CATEGORIES OF CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY SYMMETRIC KEY CRYPTOGRAPHY
  • 6. • Symmetric-key cryptography started thousands of years ago when people needed to exchange secrets (for example, in a war). We still mainly use symmetric-key cryptography in our network security. Also known as secret key • In symmetric-key cryptography, the same key is used by the sender(for encryption) and the receiver (for decryption).The key is shared. SYMMETRIC KEY CRYPTOGRAPHY
  • 7. • Also known as public key cryptography. • Sender & receiver uses different keys for encryption & decryption ASYMMETRIC KEY CRYPTOGRAPHY
  • 8. • PLAIN TEXT • CIPHER TEXT • CIPHER • CRYPTOLOGY • KEY BASIC TERMS
  • 9. SECRET KEY FUNCTIONS • Using a single key for encryption/decryption. • The plaintext and the cipher text having the same size. • Also called symmetric key cryptography PUBLIC KEY FUNCTIONS • Each individual has two keys – a private key (d): need not be reveal to anyone – a public key (e): preferably known to the entire world • Public key crypto is also called asymmetric crypto. HASH FUNCTIONS • A mathematical transformation that takes a message of arbitrary length and computes it a fixed-length (short) number. TYPES OF CRYPTOGRAPHIC FUNCTIONS
  • 11. • A substitution technique is one in which the letters/number/symbols of plaintext are replaced by other letters/numbers/symbols. e.g. A D, T Z 2 5, 3 6 SUBSTITUTION CIPHERS TRANSPOSITION CIPHER • In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another. • Plain text: MEET ME AFTER PARTY • Cipher text: TEMEEMEFAPTRYRAT • KEY USED: 421635 1 2 3 4 5 6 M E E T M E A F T E R P A R T Y 4 2 1 6 3 5 T E M E E M E F A P T R Y R A T
  • 12. ENCRYPTION & DECRYPTION ENCRYPTION The process of converting plaintext into cipher text DECRYPTION The process of converting cipher text into plaintext ENCRYPTION & DECRYPTION
  • 15. • Defense services • Digital Signatures • Identification and Authentication • Internet payment systems • E- Commerce • Access control • Data security APPLICATIONS
  • 16. By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained. CONCLUSION