SlideShare a Scribd company logo
By Kajal Chaudhari
Roll No.: 30
Cryptography in networks.
• Cryptography derived its name from a Greek word
called “Kryptos” which means “Hidden Secrets”.
• Cryptography is a method of storing and transmitting
data in a particular form so that only those for whom it
is intended can read and process it.
• The term is most often associated with scrambling
plaintext (ordinary text) into cipher text (a process
called encryption), then back again (known as
decryption).
What is cryptography?
Bob Alice
Cryptography in networks
Types of Cryptography
(Secret key) (Public key)
Asymmetric key cryptography: (Public key)
• Two different keys are used for encryption
and decryption.
• More secured, relatively complex
Symmetric key cryptography (private key)
• Only one key is used for encryption and decryption
• It is simple and faster
• Less secured
Purpose of cryptography
• Defending against external/internal
hackers
• Securing E-commerce
• Securing bank accounts/electronic
transfer
• Securing intellectual property
• Avoiding liability
Thank you!!

More Related Content

PDF
Sw2 prezen3pdf
PDF
Sw prezen3pdf
PDF
PPT
Cryptogaphy
PPTX
F16 cs61 cryptography
PPTX
Cryptography
PPTX
Encrytion ppt
PDF
DTU HTS 2017 - some take aways...
Sw2 prezen3pdf
Sw prezen3pdf
Cryptogaphy
F16 cs61 cryptography
Cryptography
Encrytion ppt
DTU HTS 2017 - some take aways...

What's hot (19)

PDF
S&Wweek12
PDF
Singapore Korea IT Symposium 2018 - SovereignWallet Network
PDF
How your JavaScript skills apply in the blockchain space
PDF
REST project brief - typical setup for teams
PPTX
SSL: What is it, How to do it, and Why you should care
PPTX
Handshake with HTTPS
PPTX
Handshaking with HTTPS - Rafiul Islam
PPTX
Basic concept of pki
PPTX
Deepweb and darkweb vinodkumar ancha
PDF
Sw2 b12
PPTX
PPTX
Deepweb darknet mansukhani
PPTX
Encryption techniques
PPT
Encryption
PPTX
Email encryption project review
PDF
How encryption work
PPTX
Cryptography ppt
PPT
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
S&Wweek12
Singapore Korea IT Symposium 2018 - SovereignWallet Network
How your JavaScript skills apply in the blockchain space
REST project brief - typical setup for teams
SSL: What is it, How to do it, and Why you should care
Handshake with HTTPS
Handshaking with HTTPS - Rafiul Islam
Basic concept of pki
Deepweb and darkweb vinodkumar ancha
Sw2 b12
Deepweb darknet mansukhani
Encryption techniques
Encryption
Email encryption project review
How encryption work
Cryptography ppt
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Ad

Viewers also liked (10)

DOCX
Quý ông “treo máy” vì áp lực ngày tết
DOCX
Education and poverty in florida
PDF
Apostila vba excel
DOC
Apostila de economia_i
PPTX
maglev train
PPTX
hybrid electric vehicle
PPTX
Data transmission rate and bandwidth
DOCX
A seminar report on maglev train
PPTX
Modern-Day Slavery
DOCX
A seminar report on hybrid electric vehicle
Quý ông “treo máy” vì áp lực ngày tết
Education and poverty in florida
Apostila vba excel
Apostila de economia_i
maglev train
hybrid electric vehicle
Data transmission rate and bandwidth
A seminar report on maglev train
Modern-Day Slavery
A seminar report on hybrid electric vehicle
Ad

Similar to Cryptography in networks (20)

PPTX
Cryptography.pptx
PPTX
Cryptography
PPTX
Cryptography
PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PPTX
Cryptography
PPTX
Cryptography
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPTX
Cryptography
PPTX
Asymmetric key
PPT
Fundamentals of cryptography
PPT
cryptography.ppt.ppt
PPT
cryptography.ppt - Copy.ppt
PDF
Information Security 05- Encryption.pdfn
PPTX
cryptography in computer and its module and application
PDF
PresentationonCRYPTOGRAPHYppt.pdf
PPTX
CRYPTOGRAPHY and its applications .pptx
PPTX
PPTX
PPTX
Cryptography
Cryptography.pptx
Cryptography
Cryptography
CSE CRYPTOGRAPHY ppt - Copy.pptx
Cryptography
Cryptography
CSE-CRYPTOGRAPHY-presentation-in-ppt format
Cryptography
Asymmetric key
Fundamentals of cryptography
cryptography.ppt.ppt
cryptography.ppt - Copy.ppt
Information Security 05- Encryption.pdfn
cryptography in computer and its module and application
PresentationonCRYPTOGRAPHYppt.pdf
CRYPTOGRAPHY and its applications .pptx
Cryptography

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Complications of Minimal Access Surgery at WLH
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Pre independence Education in Inndia.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
RMMM.pdf make it easy to upload and study
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Classroom Observation Tools for Teachers
PDF
Basic Mud Logging Guide for educational purpose
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Complications of Minimal Access Surgery at WLH
O7-L3 Supply Chain Operations - ICLT Program
Pre independence Education in Inndia.pdf
VCE English Exam - Section C Student Revision Booklet
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Anesthesia in Laparoscopic Surgery in India
RMMM.pdf make it easy to upload and study
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Classroom Observation Tools for Teachers
Basic Mud Logging Guide for educational purpose
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Renaissance Architecture: A Journey from Faith to Humanism
STATICS OF THE RIGID BODIES Hibbelers.pdf
Sports Quiz easy sports quiz sports quiz
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
PPH.pptx obstetrics and gynecology in nursing
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Structure & Organelles in detailed.

Cryptography in networks

  • 1. By Kajal Chaudhari Roll No.: 30 Cryptography in networks.
  • 2. • Cryptography derived its name from a Greek word called “Kryptos” which means “Hidden Secrets”. • Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. • The term is most often associated with scrambling plaintext (ordinary text) into cipher text (a process called encryption), then back again (known as decryption). What is cryptography?
  • 5. Types of Cryptography (Secret key) (Public key)
  • 6. Asymmetric key cryptography: (Public key) • Two different keys are used for encryption and decryption. • More secured, relatively complex
  • 7. Symmetric key cryptography (private key) • Only one key is used for encryption and decryption • It is simple and faster • Less secured
  • 8. Purpose of cryptography • Defending against external/internal hackers • Securing E-commerce • Securing bank accounts/electronic transfer • Securing intellectual property • Avoiding liability