SlideShare a Scribd company logo
A SURVEY OF CRYPTOGRAPHIC
ALGORITHMS
1
ABSTRACT
• When survey a variety of cryptographic algorithms falling into
four main
categories:
DES (block cipher), RC4 (stream cipher),
SHA-1(hash) and RSA (public-key cryptography).
• We are using cryptography method in this survey which is
related to the security concepts.
2
CRYPTOGRAPHY
• Cryptographic algorithms are a means of discreetly conveying
secret information between one party and another.
• The plaintext message is encrypted from sender side using a
crypto-graphic algorithm and decrypted the plaintext to the
receiver side.
• This will encrypt and decrypt by using cipher text which is
convert to duplicate message to hide the message from the
hacker.
3
CRYPTOGRAPHY
CONCEPT
4
APPROACHES
• It is an systematic approach and it has 3segments contains
> Security attack
> Security mechanism
> Security service
5
SECURITY ATTACK
• Any action that compromises the security of information
owned by an organization.
• The attack teamed as two types which is
->Active attack
->Passive attack
6
ACTIVE ATTACK
7
PASSIVE ATTACK
8
SECURITY MECHANISM
• The mechanisms are divided into those that are implemented in a
mechanism.
• It has specific protocol layer, such as TCP or an application-layer
protocol.
• That are not specific to any particular protocol layer or security
service either detect or prevent.
9
SECURITY SERVICES
• It is processing service or communication services mainly used for
protected the resources
• It is implemented by security mechanism
* Authentication
* Access control
* Data confidentiality
10
CLASSICAL ENCRYPTION
TECHNIQUES
• Symmetric encryption, also referred to as conventional encryption or single-
key encryption
• It was only type of encryption in use prior to the development of public key
encryption in the 1970s.
• It remains by far the most widely used of the two types of encryption.
-Symmetric
-Assymmetric
11
SYMMETRIC ALGORITHMS
• Symmetric algorithms are key-based algorithms that use the same
key for encryption and decryption.
• The Caesar cipher mentioned & Both block ciphers and stream
ciphers fall into this category
• Stream ciphers are symmetric algorithms that operate on plaintext
input one bit (or byte) at a time.
• Block ciphers are symmetric algorithms that operate on larger
blocks, usually 64 bits in size
12
SYMMETRIC CIPHER
MODEL
13
Public key cryptography
• public-key/two-key/asymmetric
cryptography involves the use of two keys:
• a public-key, which may be known by anybody,
and can be used to encrypt messages, and verify
signatures
• a private-key, known only to the recipient, used to
decrypt messages, and sign (create) signatures is
Asymmetric
• Because those who encrypt messages or verify
signatures cannot decrypt messages or create
signatures 14
Public key cryptography
15
Data encryption standards
(DES)
• Most widely used block cipher in world
• Adopted in 1977 by NBS (now NIST)
• Encrypts 64-bit data using 56-bit key has widespread
• It has been considerable controversy over its security
• Y = IP-1(X) = IP-1(IP(M)) (-1 INVERSE)
16
RSA
• The RSA encryption/decryption algorithms are a type of public
key cryptography named for Ron Rivest, Adi Shamir and
Leonard Adleman, who rst presented the algorithm in 1977
• c = me mod n.
• m = cd mod n
17
RSA Key generation
Algorithm 3 RSA Key Generation
•1: procedure Get Keys(b) ->Generates keys
based on b-bit primes
•2: p; q primes of bit-length b
•3: n p q -> First public key
•4: (p- 1)(q- 1)
•5: e e such that gcd(e; ) = 1 -> Second public
key
•6: d (e-1) mod -> Private key
•7: return n; e; d
•8: end procedure
18
CONCULSION
• The purpose of this research was to learn about cryptographic algorithms and to
analyze
• The efficiency of the RSA encryption algorithm when implemented with direct
subroutines and in direct languages.
• Future work could include implementing the algorithm in languages that better
allow bit-level manipulation, such as C.
19
THANK U
20

More Related Content

PPTX
PDF
RSA Algoritmn
PDF
Ch 12: Cryptography
PPTX
Securing Text Messages Application Using MED
PDF
Incident response, Hacker Techniques and Countermeasures
PDF
Cryto Party at CCU
PDF
Essential Guide to Protect Your Data [Key Management Techniques]
PPTX
Symmetric encryption and message confidentiality
 
RSA Algoritmn
Ch 12: Cryptography
Securing Text Messages Application Using MED
Incident response, Hacker Techniques and Countermeasures
Cryto Party at CCU
Essential Guide to Protect Your Data [Key Management Techniques]
Symmetric encryption and message confidentiality
 

What's hot (20)

PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Weaponization of IoT
PPTX
key management
PPTX
Key Management and Distribution
PDF
Encryption and Key Distribution Methods
PDF
CS6004 CYBER FORENSICS
PPT
key distribution in network security
PDF
Understanding Intrusion Detection Systems with Snort
ODP
Network Security Topic 4 cryptography2
PPTX
CISSP Certification Security Engineering-Part2
PPT
Information Security Lesson 8 - Cryptography - Eric Vanderburg
PPTX
Encryption algorithms
PDF
CS6004 CYBER FORENSICS
PPTX
Confidentiality using Symmetric Encryption
PPTX
Basic cryptography
PPTX
Slidecast - Workshop
PDF
Linux IoT Botnet Wars and the lack of basic security hardening
PPTX
Introduction to cryptography part1-final
PPT
Cryptogaphy
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Weaponization of IoT
key management
Key Management and Distribution
Encryption and Key Distribution Methods
CS6004 CYBER FORENSICS
key distribution in network security
Understanding Intrusion Detection Systems with Snort
Network Security Topic 4 cryptography2
CISSP Certification Security Engineering-Part2
Information Security Lesson 8 - Cryptography - Eric Vanderburg
Encryption algorithms
CS6004 CYBER FORENSICS
Confidentiality using Symmetric Encryption
Basic cryptography
Slidecast - Workshop
Linux IoT Botnet Wars and the lack of basic security hardening
Introduction to cryptography part1-final
Cryptogaphy
Ad

Viewers also liked (8)

PDF
Analysis of Cryptographic Algorithms for Network Security
ODP
Network Security Topic 1 intro
PPSX
Unit 2
PPTX
Chapter 1: Overview of Network Security
PPTX
Cryptography & Steganography
PPTX
Data Network Security
PPT
Network Security 1st Lecture
PPTX
Different types of attacks in internet
Analysis of Cryptographic Algorithms for Network Security
Network Security Topic 1 intro
Unit 2
Chapter 1: Overview of Network Security
Cryptography & Steganography
Data Network Security
Network Security 1st Lecture
Different types of attacks in internet
Ad

Similar to cryptography deepan fav subject (20)

PPTX
Security - ch3.pptx
PDF
Introduction to Cryptography
PPTX
Cryptography
PPTX
Security - ch3.pptx
PPTX
Cryptography and network security
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PDF
Comparative study of private and public key cryptography algorithms a survey
PPT
Cryptography Lecture by Sam Bowne
PPTX
Cryptography
PPT
6. cryptography
PPT
Cryptography cse,ru
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPT
Encryption technology
PPTX
A study of cryptography for satellite applications
PPT
Ch11 Basic Cryptography
PPT
Cryptography
PPTX
Data encryption
PDF
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
PPTX
Security - ch3.pptx
Introduction to Cryptography
Cryptography
Security - ch3.pptx
Cryptography and network security
Ch12 Cryptography it-slideshares.blogspot.com
Comparative study of private and public key cryptography algorithms a survey
Cryptography Lecture by Sam Bowne
Cryptography
6. cryptography
Cryptography cse,ru
Fundamentals of Cryptography: Securing Data in the Digital Age
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Encryption technology
A study of cryptography for satellite applications
Ch11 Basic Cryptography
Cryptography
Data encryption
Hybrid cryptographic technique using rsa algorithm and scheduling concepts

Recently uploaded (20)

DOC
NSCAD毕业证学历认证,温哥华岛大学毕业证国外证书制作申请
PPTX
the-solar-system.pptxxxxxxxxxxxxxxxxxxxx
PPTX
PRECISION AGRICULTURE- 1.pptx for agriculture
PDF
Songlyrics.net-website for lyrics song download
PDF
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
PDF
EVs U-5 ONE SHOT Notes_c49f9e68-5eac-4201-bf86-b314ef5930ba.pdf
PPTX
G.A.M.E. O.N.! (General — Art — Mythology — Entertainment — Obscure Naata) [2...
PDF
Commercial arboriculture Commercial Tree consultant Essex, Kent, Thaxted.pdf
PDF
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
PPTX
Monopoly - HOW TO play in a simplified tab
PDF
High-Quality PDF Backlinking for Better Rankings
PDF
MAGNET STORY- Coaster Sequence (Rough Version 2).pdf
PPTX
just letters randomized coz i need to up
DOCX
Elisabeth de Pot, the Witch of Flanders .
DOCX
Talking Owls and Time Travel: Lessons in Curiosity
PPTX
701301-Happy Birthday Slideshow Template.pptx
PDF
What is Rotoscoping Best Software for Rotoscoping in 2025.pdf
PPTX
Hacking Movie – Best Films on Cybercrime & Digital Intrigue
PDF
Download FL Studio Crack Latest version 2025
DOC
UNG毕业证学历认证,阿莱恩特国际大学毕业证文凭证书
NSCAD毕业证学历认证,温哥华岛大学毕业证国外证书制作申请
the-solar-system.pptxxxxxxxxxxxxxxxxxxxx
PRECISION AGRICULTURE- 1.pptx for agriculture
Songlyrics.net-website for lyrics song download
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
EVs U-5 ONE SHOT Notes_c49f9e68-5eac-4201-bf86-b314ef5930ba.pdf
G.A.M.E. O.N.! (General — Art — Mythology — Entertainment — Obscure Naata) [2...
Commercial arboriculture Commercial Tree consultant Essex, Kent, Thaxted.pdf
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
Monopoly - HOW TO play in a simplified tab
High-Quality PDF Backlinking for Better Rankings
MAGNET STORY- Coaster Sequence (Rough Version 2).pdf
just letters randomized coz i need to up
Elisabeth de Pot, the Witch of Flanders .
Talking Owls and Time Travel: Lessons in Curiosity
701301-Happy Birthday Slideshow Template.pptx
What is Rotoscoping Best Software for Rotoscoping in 2025.pdf
Hacking Movie – Best Films on Cybercrime & Digital Intrigue
Download FL Studio Crack Latest version 2025
UNG毕业证学历认证,阿莱恩特国际大学毕业证文凭证书

cryptography deepan fav subject

  • 1. A SURVEY OF CRYPTOGRAPHIC ALGORITHMS 1
  • 2. ABSTRACT • When survey a variety of cryptographic algorithms falling into four main categories: DES (block cipher), RC4 (stream cipher), SHA-1(hash) and RSA (public-key cryptography). • We are using cryptography method in this survey which is related to the security concepts. 2
  • 3. CRYPTOGRAPHY • Cryptographic algorithms are a means of discreetly conveying secret information between one party and another. • The plaintext message is encrypted from sender side using a crypto-graphic algorithm and decrypted the plaintext to the receiver side. • This will encrypt and decrypt by using cipher text which is convert to duplicate message to hide the message from the hacker. 3
  • 5. APPROACHES • It is an systematic approach and it has 3segments contains > Security attack > Security mechanism > Security service 5
  • 6. SECURITY ATTACK • Any action that compromises the security of information owned by an organization. • The attack teamed as two types which is ->Active attack ->Passive attack 6
  • 9. SECURITY MECHANISM • The mechanisms are divided into those that are implemented in a mechanism. • It has specific protocol layer, such as TCP or an application-layer protocol. • That are not specific to any particular protocol layer or security service either detect or prevent. 9
  • 10. SECURITY SERVICES • It is processing service or communication services mainly used for protected the resources • It is implemented by security mechanism * Authentication * Access control * Data confidentiality 10
  • 11. CLASSICAL ENCRYPTION TECHNIQUES • Symmetric encryption, also referred to as conventional encryption or single- key encryption • It was only type of encryption in use prior to the development of public key encryption in the 1970s. • It remains by far the most widely used of the two types of encryption. -Symmetric -Assymmetric 11
  • 12. SYMMETRIC ALGORITHMS • Symmetric algorithms are key-based algorithms that use the same key for encryption and decryption. • The Caesar cipher mentioned & Both block ciphers and stream ciphers fall into this category • Stream ciphers are symmetric algorithms that operate on plaintext input one bit (or byte) at a time. • Block ciphers are symmetric algorithms that operate on larger blocks, usually 64 bits in size 12
  • 14. Public key cryptography • public-key/two-key/asymmetric cryptography involves the use of two keys: • a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures • a private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures is Asymmetric • Because those who encrypt messages or verify signatures cannot decrypt messages or create signatures 14
  • 16. Data encryption standards (DES) • Most widely used block cipher in world • Adopted in 1977 by NBS (now NIST) • Encrypts 64-bit data using 56-bit key has widespread • It has been considerable controversy over its security • Y = IP-1(X) = IP-1(IP(M)) (-1 INVERSE) 16
  • 17. RSA • The RSA encryption/decryption algorithms are a type of public key cryptography named for Ron Rivest, Adi Shamir and Leonard Adleman, who rst presented the algorithm in 1977 • c = me mod n. • m = cd mod n 17
  • 18. RSA Key generation Algorithm 3 RSA Key Generation •1: procedure Get Keys(b) ->Generates keys based on b-bit primes •2: p; q primes of bit-length b •3: n p q -> First public key •4: (p- 1)(q- 1) •5: e e such that gcd(e; ) = 1 -> Second public key •6: d (e-1) mod -> Private key •7: return n; e; d •8: end procedure 18
  • 19. CONCULSION • The purpose of this research was to learn about cryptographic algorithms and to analyze • The efficiency of the RSA encryption algorithm when implemented with direct subroutines and in direct languages. • Future work could include implementing the algorithm in languages that better allow bit-level manipulation, such as C. 19