SlideShare a Scribd company logo
Cryptography –
Encryption/Decryption
cryptography in computer and its module and application
What is Cryptography?
Cryptography derived its name from
a Greek word called “Kryptos” which
means “Hidden Secrets”.
Cryptography is the practice and
study of hiding information.
It is the Art or Science of converting a
plain intelligible data into an
unintelligible data and again
retransforming that message into its
original form.
It provides
Confidentiality, Integrity, Accuracy.
What is Cryptography
Cryptography
In a narrow sense
Mangling information into apparent unintelligibility
Allowing a secret method of un-mangling
In a broader sense
Mathematical techniques related to information security
About secure communication in the presence of adversaries
Cryptanalysis
The study of methods for obtaining the meaning of encrypted
information without accessing the secret information
Cryptology
Cryptography + cryptanalysis
Cryptography is the science of secret writing is an
ancient art; the first documented use of cryptography in writing
dates back to circa 1900 B.C. when an Egyptian scribe used non-
standard hieroglyphs in an inscription.
Some experts argue that cryptography appeared spontaneously
sometime after writing was invented, with applications ranging
from diplomatic missives to war-time battle plans.
It is no surprise, then, that new forms of cryptography
came soon after the widespread development of computer
communications. In data and telecommunications,
cryptography is necessary when communicating over any
untrusted medium, which includes just about any network,
particularly the Internet.
FUNCTIONS OF CRYTPGRAPHY
There are five primary functions of cryptography today:
1. Privacy/confidentiality: Ensuring that no one can read the
message except the intended receiver.
2. Authentication: The process of proving one's identity.
3. Integrity: Assuring the receiver that the received message has
not been altered in any way from the original.
4. Non-repudiation: A mechanism to prove that the sender really
sent this message.
5. Key exchange: The method by which crypto keys are shared
between sender and receiver.
In cryptography, we start with the unencrypted data, referred to
as plaintext. Plaintext is encrypted into ciphertext, which will in
turn (usually) be decrypted back into usable plaintext.
The encryption and decryption is based upon the type of
cryptography scheme being employed and some form of key. For
those who like formulas, this process is sometimes written as:
C=Ek(P)
P = Dk(C)
where P = plaintext, C = ciphertext, E = the encryption
method, D = the decryption method, and k = the key
What is Encryption / Decryption
 Encryption –
◦ The process of converting plain text into an
unintelligible format (cipher text) is called
Encryption.
 Decryption –
◦ The process of converting cipher text into a plain
text is called Decryption.
 What is a Key
◦ In cryptography, a key is a variable value that is applied
using an algorithm to a string or block of unencrypted text
to produce encrypted text, or to decrypt encrypted text.
The length of the key is a factor in considering how
difficult it will be to decrypt the text in a given message.
 What is a Block Cipher?
◦ A block cipher is an encryption method that applies a
deterministic algorithm along with a symmetric key to encrypt
a block of text, rather than encrypting one bit at a time as in
stream ciphers.
TYPES OF CRYPTOGRAPHIC ALGORITHMS
There are several ways of classifying cryptographic algorithms
The three types of algorithms that will be discussed are :
Secret Key Cryptography (SKC): Uses a single key for both
encryption and decryption; also called symmetric encryption.
Primarily used for privacy and confidentiality.
Public Key Cryptography (PKC): Uses one key for encryption
and another for decryption; also called asymmetric encryption.
Primarily used for authentication, non-repudiation, and key
exchange.
Hash Functions: Uses a mathematical transformation to
irreversibly "encrypt" information, providing a digital fingerprint.
Primarily used for message integrity.
cryptography in computer and its module and application
What are the Types of Cryptography
 Symmetric Key Cryptography (Secret Key Cryptography)
◦ Same Key is used by both parties
Advantages
1. Simpler and Faster
Disadvantages
1. Less Secured
 Asymmetric Key Cryptography (Public Key Cryptography)
◦ 2 different keys are used
◦ Users get the Key from an Certificate Authority
Advantages
1. More Secured
2. Authentication
Disadvantages
1. Relatively Complex
Secret Key Cryptography
Using a single key for encryption/decryption.
The plaintext and the ciphertext having the same size.
Also called symmetric key cryptography
plaintext
ciphertext plaintext
ciphertext
decryption
encryption
key
Secret Key Cryptography
Using a single key for encryption/decryption.
The plaintext and the ciphertext having the same size.
Also called symmetric key cryptography
plaintext
ciphertext plaintext
ciphertext
decryption
encryption
key
THANK YOU

More Related Content

PPTX
Cryptography.pptx
PDF
UNIT 3 Information Security Sharad Institute
PDF
Encryption
PPTX
Basics of Cryptography presentation.pptx
PPT
Fundamentals of cryptography
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Cryptography
PPT
Cryptography cse,ru
Cryptography.pptx
UNIT 3 Information Security Sharad Institute
Encryption
Basics of Cryptography presentation.pptx
Fundamentals of cryptography
Detailed description about the concept of E Commerce UNIT IV.pptx
Cryptography
Cryptography cse,ru

Similar to cryptography in computer and its module and application (20)

PPTX
Introduction to Cryptography
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
PresentationonCRYPTOGRAPHY.pptx
PPTX
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
PPTX
Cryptography
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPTX
Cryptography and Network Security Principles.pptx
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPTX
Cryptography
PPTX
Cryptography by manisha jha
PPTX
4.IS@Mohsin.pptx........................
PPTX
Cryptography by Durlab Kumbhakar
PPTX
cryptography ppt free download
PDF
Analysis of Cryptography Techniques
Introduction to Cryptography
Cryptography.pptxhis document provides an overview of cryptography. It define...
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
PresentationonCRYPTOGRAPHY.pptx
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
Cryptography
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
Cryptography and Network Security Principles.pptx
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
Cryptography
Cryptography by manisha jha
4.IS@Mohsin.pptx........................
Cryptography by Durlab Kumbhakar
cryptography ppt free download
Analysis of Cryptography Techniques
Ad

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Ad

cryptography in computer and its module and application

  • 3. What is Cryptography? Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 4. What is Cryptography Cryptography In a narrow sense Mangling information into apparent unintelligibility Allowing a secret method of un-mangling In a broader sense Mathematical techniques related to information security About secure communication in the presence of adversaries Cryptanalysis The study of methods for obtaining the meaning of encrypted information without accessing the secret information Cryptology Cryptography + cryptanalysis
  • 5. Cryptography is the science of secret writing is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non- standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.
  • 6. FUNCTIONS OF CRYTPGRAPHY There are five primary functions of cryptography today: 1. Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. 2. Authentication: The process of proving one's identity. 3. Integrity: Assuring the receiver that the received message has not been altered in any way from the original. 4. Non-repudiation: A mechanism to prove that the sender really sent this message. 5. Key exchange: The method by which crypto keys are shared between sender and receiver.
  • 7. In cryptography, we start with the unencrypted data, referred to as plaintext. Plaintext is encrypted into ciphertext, which will in turn (usually) be decrypted back into usable plaintext. The encryption and decryption is based upon the type of cryptography scheme being employed and some form of key. For those who like formulas, this process is sometimes written as: C=Ek(P) P = Dk(C) where P = plaintext, C = ciphertext, E = the encryption method, D = the decryption method, and k = the key
  • 8. What is Encryption / Decryption  Encryption – ◦ The process of converting plain text into an unintelligible format (cipher text) is called Encryption.  Decryption – ◦ The process of converting cipher text into a plain text is called Decryption.
  • 9.  What is a Key ◦ In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the text in a given message.  What is a Block Cipher? ◦ A block cipher is an encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers.
  • 10. TYPES OF CRYPTOGRAPHIC ALGORITHMS There are several ways of classifying cryptographic algorithms The three types of algorithms that will be discussed are : Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption; also called symmetric encryption. Primarily used for privacy and confidentiality. Public Key Cryptography (PKC): Uses one key for encryption and another for decryption; also called asymmetric encryption. Primarily used for authentication, non-repudiation, and key exchange. Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information, providing a digital fingerprint. Primarily used for message integrity.
  • 12. What are the Types of Cryptography  Symmetric Key Cryptography (Secret Key Cryptography) ◦ Same Key is used by both parties Advantages 1. Simpler and Faster Disadvantages 1. Less Secured
  • 13.  Asymmetric Key Cryptography (Public Key Cryptography) ◦ 2 different keys are used ◦ Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex
  • 14. Secret Key Cryptography Using a single key for encryption/decryption. The plaintext and the ciphertext having the same size. Also called symmetric key cryptography plaintext ciphertext plaintext ciphertext decryption encryption key
  • 15. Secret Key Cryptography Using a single key for encryption/decryption. The plaintext and the ciphertext having the same size. Also called symmetric key cryptography plaintext ciphertext plaintext ciphertext decryption encryption key