SlideShare a Scribd company logo
Seminar
On
CRYPTOGRAPHY
Presented by:
Durlab Kumbhakar
What is Cryptography?
 Cryptography derived its name from the Greek words called
“krypto’s” which means “Hidden or Secrets” and “graphein”
which means “Writing or Study.”
 Cryptography is the practice and study of hiding information or
secret writing. It is the Art or Science of converting a plain
intelligible data into an unintelligible data and again
retransforming that message into its original form.
 It provides Confidentiality, Integrity, and Accuracy.
Purpose of Cryptography
 Privacy/confidentiality: Ensuring that no one can read the
message except the intended receiver.
 Integrity: Assuring the receiver that the received message has
not been altered in any way from the original.
 Non-repudiation: A mechanism to prove that the sender
really sent this message.
Component of Cryptosystem
• Plaintext
• Encryption Algorithm
• Ciphertext
• Decryption Algorithm
• Encryption Key
• Decryption Key
Encryption and Decryption
plaintext
message
ciphertext
message
Encryption
Decryption
Types of Cryptography
Two types of Cryptography is available
1. SYMMETRIC KEY CRYPTOGRAPHY
2. ASYMMETRIC KEY CRYPTOGRAPHY
• Single key used to encrypt
and decrypt.
• Key must be known by both
parties.
• Assuming we live in a
hostile environment, it may
be hard to share a secret key..
• Examples of popular
symmetric algorithms
include DES, 3DES,
AES, Blowfish, etc.
1. Symmetric Key Cryptography
 Different keys are used to
encrypt and decrypt the
information.
 Each entity has 2 keys:
Private Key (a secret)
Public key (well known); one
key is used for encryption, the
other can decrypt the ciphertext
back to the original plaintext.
Examples of popular Asymmetric
algorithms include RSA, DSA, etc
2. Asymmetric Key Cryptography
TYPES OF CRYPTOGRAPHIC ALGORITHMS
3DE
S
• DES (the data encryption standard) is a symmetric block cipher.
The algorithm uses a 56-bit key to encipher/decipher a 64-bit block
of data. The key is always presented as a 64-bit block, every 8th bit
of which is ignored. However, it is usual to set each 8th bit so that
each group of 8 bits has an odd number of bits set to 1.
Use of multiple length keys leads us to the
Triple-DES algorithm, in which DES is
applied three times. If we consider a triple
length key to consist of three 56-bit keys
K1, K2, K3 then encryption and
decryption is beside the table:
.
Encryption Decryption( in
reverse of
Encryption)
• Encrypt with K1
• Decrypt with K2
• Encrypt with K3
• Decrypt with K3
• Encrypt with K2
• Decrypt with K1
DES: DATA ENCRYPTION
STANDARD
fig:- RSA1
RSA is a public key
algorithm invented by
Rivest, Shamir and
Adleman.
The key used for
encryption is different
from (but related to)
the key used for
decryption.
Algorithm is in fig:-
RSA1
RS
A
Hash functions
 Is a type of one-way function this are fundamental for much of
cryptography.
 A one way function - is a function that is easy to calculate but
hard to invert.
 It is difficult to calculate the input to the function given its output.
 The precise meanings of "easy" and "hard" can be specified
mathematically. With rare exceptions, almost the entire field of
public key cryptography rests on the existence of one-way
functions.
Applications of Cryptography
1. Defense Services
2. Secure Data Manipulation
3. E-Commerce
4. Business Transactions
5. Internet Payment System
6. Secure Internet Communication
7. Data Security
8. Secure Access to Corresponding data
Cryptographic Attacks
Ciphertext only attack
 The only data available is a target cipher text
Known plaintext attack
 A target cipher text
 Pairs of other cipher text and plaintext (say, previously broken or guessing)
Chosen plaintext attacks
 A target cipher text
 Can feed encryption algorithm with plaintexts and obtain the matching cipher
texts
and so many attacks available like Dictionary Attack, Timing Attacks etc.
CONCLUSION
 We use different types of algorithms to establish security
services in different service mechanisms.
 We use either private key cryptography or public key
cryptography according to requirement.
 If we want to send message quickly we use private key algorithm
and if we want to send messages secretly we use public key
algorithm.
References
 www.google.com
 en.wikipedia.org
 www.youtube.com
 www.tutorialspoint.com
Thank You

More Related Content

PDF
Introduction to Cryptography
PPTX
Block Cipher
PPTX
Cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Cryptography
PPTX
Cryptography
PPTX
Cryptography and Network Security
Introduction to Cryptography
Block Cipher
Cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography
Cryptography
Cryptography and Network Security

What's hot (20)

PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Diffie Hellman Key Exchange
PPT
Network security cryptographic hash function
PPTX
Cryptography
PPTX
SSL TLS Protocol
PPTX
Advanced encryption standard (aes)
PPT
Cryptography
PPT
Digital Signature
PPT
Fundamentals of cryptography
PPT
6. cryptography
PPT
Digital Signature Standard
PDF
Block Ciphers and the Data Encryption Standard
PPT
Cryptography Fundamentals
PPTX
Digital signature(Cryptography)
PPTX
PPT
Message Authentication
PPTX
Cryptography and Information Security
PPTX
Hash Function
Cryptography
Cryptography
Cryptography
Diffie Hellman Key Exchange
Network security cryptographic hash function
Cryptography
SSL TLS Protocol
Advanced encryption standard (aes)
Cryptography
Digital Signature
Fundamentals of cryptography
6. cryptography
Digital Signature Standard
Block Ciphers and the Data Encryption Standard
Cryptography Fundamentals
Digital signature(Cryptography)
Message Authentication
Cryptography and Information Security
Hash Function
Ad

Similar to Cryptography by Durlab Kumbhakar (20)

PPTX
Security - ch3.pptx
PPT
Cryptography cse,ru
PPTX
Cryptography
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPTX
Introduction to Cryptography for btech cse
PPTX
Security - ch3.pptx
PPTX
PresentationonCRYPTOGRAPHY.pptx
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PDF
Analysis of Cryptography Techniques
PPTX
cryptography ppt free download
PDF
Cryptology - The practice and study of hiding information
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
DOCX
Seminar report on symmetric key
PPTX
big data and Iot , its security part ,hoe yoy help this
PDF
Basic Cryptography.pdf
Security - ch3.pptx
Cryptography cse,ru
Cryptography
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Introduction to Cryptography for btech cse
Security - ch3.pptx
PresentationonCRYPTOGRAPHY.pptx
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
Analysis of Cryptography Techniques
cryptography ppt free download
Cryptology - The practice and study of hiding information
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
Seminar report on symmetric key
big data and Iot , its security part ,hoe yoy help this
Basic Cryptography.pdf
Ad

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Modernizing your data center with Dell and AMD
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf

Cryptography by Durlab Kumbhakar

  • 2. What is Cryptography?  Cryptography derived its name from the Greek words called “krypto’s” which means “Hidden or Secrets” and “graphein” which means “Writing or Study.”  Cryptography is the practice and study of hiding information or secret writing. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form.  It provides Confidentiality, Integrity, and Accuracy.
  • 3. Purpose of Cryptography  Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.  Integrity: Assuring the receiver that the received message has not been altered in any way from the original.  Non-repudiation: A mechanism to prove that the sender really sent this message.
  • 4. Component of Cryptosystem • Plaintext • Encryption Algorithm • Ciphertext • Decryption Algorithm • Encryption Key • Decryption Key
  • 6. Types of Cryptography Two types of Cryptography is available 1. SYMMETRIC KEY CRYPTOGRAPHY 2. ASYMMETRIC KEY CRYPTOGRAPHY
  • 7. • Single key used to encrypt and decrypt. • Key must be known by both parties. • Assuming we live in a hostile environment, it may be hard to share a secret key.. • Examples of popular symmetric algorithms include DES, 3DES, AES, Blowfish, etc. 1. Symmetric Key Cryptography
  • 8.  Different keys are used to encrypt and decrypt the information.  Each entity has 2 keys: Private Key (a secret) Public key (well known); one key is used for encryption, the other can decrypt the ciphertext back to the original plaintext. Examples of popular Asymmetric algorithms include RSA, DSA, etc 2. Asymmetric Key Cryptography
  • 10. 3DE S • DES (the data encryption standard) is a symmetric block cipher. The algorithm uses a 56-bit key to encipher/decipher a 64-bit block of data. The key is always presented as a 64-bit block, every 8th bit of which is ignored. However, it is usual to set each 8th bit so that each group of 8 bits has an odd number of bits set to 1. Use of multiple length keys leads us to the Triple-DES algorithm, in which DES is applied three times. If we consider a triple length key to consist of three 56-bit keys K1, K2, K3 then encryption and decryption is beside the table: . Encryption Decryption( in reverse of Encryption) • Encrypt with K1 • Decrypt with K2 • Encrypt with K3 • Decrypt with K3 • Encrypt with K2 • Decrypt with K1 DES: DATA ENCRYPTION STANDARD
  • 11. fig:- RSA1 RSA is a public key algorithm invented by Rivest, Shamir and Adleman. The key used for encryption is different from (but related to) the key used for decryption. Algorithm is in fig:- RSA1 RS A
  • 12. Hash functions  Is a type of one-way function this are fundamental for much of cryptography.  A one way function - is a function that is easy to calculate but hard to invert.  It is difficult to calculate the input to the function given its output.  The precise meanings of "easy" and "hard" can be specified mathematically. With rare exceptions, almost the entire field of public key cryptography rests on the existence of one-way functions.
  • 13. Applications of Cryptography 1. Defense Services 2. Secure Data Manipulation 3. E-Commerce 4. Business Transactions 5. Internet Payment System 6. Secure Internet Communication 7. Data Security 8. Secure Access to Corresponding data
  • 14. Cryptographic Attacks Ciphertext only attack  The only data available is a target cipher text Known plaintext attack  A target cipher text  Pairs of other cipher text and plaintext (say, previously broken or guessing) Chosen plaintext attacks  A target cipher text  Can feed encryption algorithm with plaintexts and obtain the matching cipher texts and so many attacks available like Dictionary Attack, Timing Attacks etc.
  • 15. CONCLUSION  We use different types of algorithms to establish security services in different service mechanisms.  We use either private key cryptography or public key cryptography according to requirement.  If we want to send message quickly we use private key algorithm and if we want to send messages secretly we use public key algorithm.
  • 16. References  www.google.com  en.wikipedia.org  www.youtube.com  www.tutorialspoint.com