SlideShare a Scribd company logo
Cryptography and security
cryptographyThe art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.
Defending against external/internal hackersDefending against industrial espionageSecuring E-commerceSecuring bank accounts/electronic transfersSecuring intellectual propertyAvoiding liabilityPurpose of cryptograpy and security
Cryptography
Cryptography
Cryptography
TYPESPublic Key Cryptography (PKC): Uses one key for encryption and another for decryption Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
Cryptography
          With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.Secret Key Cryptography
Secret Key Cryptography
Public-Key CryptographyGeneric PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. The important point here is that it does not matter which key is applied first, but that both keys are required for the process to work (Figure 1B). Because a pair of keys are required, this approach is also called asymmetric cryptography.
Public-Key Cryptography

More Related Content

PPTX
Cryptography.ppt
PPT
Fundamentals of cryptography
PDF
Introduction to Cryptography
PPTX
Cryptography and Information Security
PPT
6. cryptography
PPTX
cryptography
PPT
Cryptography
PDF
Asymmetric Cryptography
Cryptography.ppt
Fundamentals of cryptography
Introduction to Cryptography
Cryptography and Information Security
6. cryptography
cryptography
Cryptography
Asymmetric Cryptography

What's hot (20)

PPTX
Cryptography and network security Nit701
PPTX
Cryptography
PPTX
Overview of cryptography
PPTX
Cryptography
PPT
DES (Data Encryption Standard) pressentation
PPT
Cryptography
PDF
Transposition cipher
PPTX
Symmetric and asymmetric key cryptography
PPTX
Kerberos
PPTX
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PPTX
Rsa Crptosystem
PPTX
Cryptography
PPTX
Cryptography and Network Security
PPTX
Double DES & Triple DES
PPT
Secure Socket Layer (SSL)
PDF
2. public key cryptography and RSA
PPTX
Cryptography
PPTX
Advanced cryptography and implementation
PPTX
Symmetric and asymmetric key
Cryptography and network security Nit701
Cryptography
Overview of cryptography
Cryptography
DES (Data Encryption Standard) pressentation
Cryptography
Transposition cipher
Symmetric and asymmetric key cryptography
Kerberos
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
Rsa Crptosystem
Cryptography
Cryptography and Network Security
Double DES & Triple DES
Secure Socket Layer (SSL)
2. public key cryptography and RSA
Cryptography
Advanced cryptography and implementation
Symmetric and asymmetric key
Ad

Viewers also liked (9)

PPTX
Beauty of Mathematic
PPTX
Password based cryptography
PPT
PPTX
Cryptography
PPT
Network security
PPTX
Visual cryptography for color images
PPTX
Slideshare.Com Powerpoint
PPT
Network Security Threats and Solutions
PPTX
Cryptography and network security
Beauty of Mathematic
Password based cryptography
Cryptography
Network security
Visual cryptography for color images
Slideshare.Com Powerpoint
Network Security Threats and Solutions
Cryptography and network security
Ad

Similar to Cryptography (20)

PDF
Cryptography and Network Lecture Notes
PPTX
Cryptography
DOCX
Cyber public key cryptography
PDF
cryptography
DOCX
Cryptography and security
PDF
Types of Cryptosystem and Cryptographic Attack
PPTX
Cryptography
DOC
Cryptography saurabh
PDF
UNIT 3 Information Security Sharad Institute
DOCX
DOCX
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
PPTX
Cryptography and Network Security Principles.pptx
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PDF
Data security for any organization by using public key infrastructure compone...
PDF
Data security for any organization by using public key infrastructure compone...
PDF
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
PPT
Cryptography al-hamadi111
Cryptography and Network Lecture Notes
Cryptography
Cyber public key cryptography
cryptography
Cryptography and security
Types of Cryptosystem and Cryptographic Attack
Cryptography
Cryptography saurabh
UNIT 3 Information Security Sharad Institute
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptography and Network Security Principles.pptx
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
Cryptography al-hamadi111

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?

Cryptography

  • 2. cryptographyThe art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.
  • 3. Defending against external/internal hackersDefending against industrial espionageSecuring E-commerceSecuring bank accounts/electronic transfersSecuring intellectual propertyAvoiding liabilityPurpose of cryptograpy and security
  • 7. TYPESPublic Key Cryptography (PKC): Uses one key for encryption and another for decryption Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption
  • 9. With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.Secret Key Cryptography
  • 11. Public-Key CryptographyGeneric PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key. One key is used to encrypt the plaintext and the other key is used to decrypt the ciphertext. The important point here is that it does not matter which key is applied first, but that both keys are required for the process to work (Figure 1B). Because a pair of keys are required, this approach is also called asymmetric cryptography.