SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
CRYPTOGRAPHY
Index
ο‚— Introduction
ο‚— What is Cryptography?
ο‚— Purpose Of cryptography
ο‚— Architecture of cryptography
ο‚— Types of Cryptography
ο‚— Process of cryptography
ο‚— Types Of cryptography Algorithms
Attacks of cryptography
ο‚— Conclusion
ο‚— References
INTRODUCTION
ο‚— The Internet or the global Internet is the internationally connected
network of computer networks with addresses that are
administrated by IANA (Internet address and Naming Authority).
ο‚— There are many aspects to security and many applications,
ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect
for secure communications is that of cryptography.
What is Cryptography?
ο‚— Cryptography derived its name from a Greek word called
β€œkrypto’s” which means β€œHidden Secrets”.
ο‚— Cryptography is the practice and study of hiding information. It
is the Art or Science of converting a plain intelligible data into an
unintelligible data and again retransforming that message into its
original form.
ο‚— It provides Confidentiality, Integrity, and Accuracy.
PURPOSE OF CRYPTOGRAPHY
ο‚— Authentication: The process of proving one's identity. (The
primary forms of host-to-host authentication on the Internet
today are name-based or address-based, both of which are
notoriously weak.)
ο‚— Privacy/confidentiality: Ensuring that no one can read the
message except the intended receiver.
ο‚— Integrity: Assuring the receiver that the received message has
not been altered in any way from the original.
ο‚— Non-repudiation: A mechanism to prove that the sender
really sent this message.
Architecture of cryptography
Types of Cryptography
Secret Key Cryptography
β€’ Single key used to encrypt and decrypt.
β€’ Key must be known by both parties.
β€’ Assuming we live in a hostile environment (otherwise - why the
need for cryptography?), it may be hard to share a secret key.
Public Key Cryptography
ο‚— One of the keys allocated to each person is called the "public
key", and is published in an open directory somewhere where
anyone can easily look it up, for example by email address.
ο‚— Each entity has 2 keys:
ο‚— Private Key (a secret)
ο‚— Public key (well known).
Using Keys
ο‚— Private keys are used for decrypting.
ο‚— Public keys are used for encrypting.
Process of cryptography
TYPES OF CRYPTOGRAPHIC
ALGORITHMS
Public/Private Key Cryptography
ο‚§ Asymmetric key cryptography overcomes the key management
problem by using different encryption and decryption key pairs.
Having knowledge of one key, say the encryption key, is not
sufficient enough to determine the other key - the decryption key.
ο‚§ The mathematical relationship between the public/private key
pair permits a general rule: any message encrypted with one key
of the pair can be successfully decrypted only with that key's
counterpart.
Hash functions
ο‚— Is a type of one-way function this are fundamental for much of
cryptography.
ο‚— A one way function - is a function that is easy to calculate but
hard to invert.
ο‚— It is difficult to calculate the input to the function given its output.
ο‚— The precise meanings of "easy" and "hard" can be specified
mathematically. With rare exceptions, almost the entire field of
public key cryptography rests on the existence of one-way
functions.
Attacks of cryptography
Cipher text only attack
ο‚§ The only data available is a target cipher text
Known plaintext attack
ο‚§ A target cipher text
ο‚§ Pairs of other cipher text and plaintext (say, previously broken
or guessing)
Attacks of cryptography…
Chosen plaintext attacks
ο‚§ A target cipher text
ο‚· Can feed encryption algorithm with plaintexts and obtain
the matching cipher texts
Chosen cipher text attack
ο‚§ A target cipher text
ο‚§ Can feed decryption algorithm with cipher texts and obtain the
matching plaintext matching cipher texts
CONCLUSION
ο‚— We use different types of algorithms to establish security
services in different service mechanisms.
ο‚— We use either private key cryptography or public key
cryptography according to requirement.
ο‚— If we want to send message quickly we use private key algorithm
and if we want to send messages secretly we use public key
algorithm.
References
ο‚— www.oeclib.in
ο‚— www.google.com
ο‚— www.wikipedia.com
Thanks…!!!
ο‚—Any Query

More Related Content

PPTX
Cryptography
PPTX
cryptography
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography.ppt
PPTX
Cryptography
Cryptography
cryptography
Cryptography
Cryptography
Cryptography.ppt
Cryptography

What's hot (20)

PPTX
Cryptography and Information Security
PPTX
Encryption ppt
PDF
Asymmetric Cryptography
PPTX
Data Encryption Standard (DES)
PPT
Symmetric & Asymmetric Cryptography
PPT
Network security cryptography ppt
PPT
6. cryptography
PPTX
Public Key Cryptography
PPTX
Cryptography
PPTX
Types of attacks
PPTX
OSI Security Architecture
PPT
Symmetric and Asymmetric Encryption.ppt
PPT
Email Security : PGP & SMIME
PPT
Security Attacks.ppt
PPTX
Cryptography
PPTX
Introduction to Cryptography
PPTX
Hash Function
PPTX
Network security model.pptx
PPTX
Public Key Cryptosystem
PPTX
Computer security concepts
Cryptography and Information Security
Encryption ppt
Asymmetric Cryptography
Data Encryption Standard (DES)
Symmetric & Asymmetric Cryptography
Network security cryptography ppt
6. cryptography
Public Key Cryptography
Cryptography
Types of attacks
OSI Security Architecture
Symmetric and Asymmetric Encryption.ppt
Email Security : PGP & SMIME
Security Attacks.ppt
Cryptography
Introduction to Cryptography
Hash Function
Network security model.pptx
Public Key Cryptosystem
Computer security concepts
Ad

Similar to Cryptography ppt (20)

PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt
PPT
Presentationon ON THE TOPIC CRYPTOGRAPHY
PPT
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PPT
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PPTX
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPTX
cryptography ppt free download
PPTX
PresentationonCRYPTOGRAPHY.pptx
PPT
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PPT
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
PPTX
Cryptography by Durlab Kumbhakar
PPTX
Introduction to Cryptography for btech cse
PPT
Fundamentals of cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PDF
UNIT 3 Information Security Sharad Institute
PPTX
Introduction to cryptography part1-final
PPTX
Cryptography
PPTX
groupWork.pptx
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
Presentationon ON THE TOPIC CRYPTOGRAPHY
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
CSE-CRYPTOGRAPHY-presentation-in-ppt format
cryptography ppt free download
PresentationonCRYPTOGRAPHY.pptx
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
Lecture 7 - CRYPTOGRAPHYpptof my presentation.ppt
Cryptography by Durlab Kumbhakar
Introduction to Cryptography for btech cse
Fundamentals of cryptography
Cryptography and Network Security Principles.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
UNIT 3 Information Security Sharad Institute
Introduction to cryptography part1-final
Cryptography
groupWork.pptx
Ad

More from OECLIB Odisha Electronics Control Library (20)

PPTX
Distributed Computing ppt
PPTX
PPTX
PPTX
Agent Oriented Programming PPT
PPTX
Wireless application protocol ppt
PPTX
Wireless Communication ppt
PPTX
PPTX
Sixth sense technology ppt
PPTX
Software developement life cycle ppt
PPTX
Voice-over-Internet Protocol (VoIP) ppt
PPTX
PPTX
Virtual Private Networks (VPN) ppt

Recently uploaded (20)

PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
PPTX
Digital Literacy And Online Safety on internet
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
artificial intelligence overview of it and more
PPTX
Internet___Basics___Styled_ presentation
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
Β 
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
Β 
Digital Literacy And Online Safety on internet
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
tcp ip networks nd ip layering assotred slides
Tenda Login Guide: Access Your Router in 5 Easy Steps
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Unit-3 cyber security network security of internet system
Introuction about ICD -10 and ICD-11 PPT.pptx
Introuction about WHO-FIC in ICD-10.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
artificial intelligence overview of it and more
Internet___Basics___Styled_ presentation
Module 1 - Cyber Law and Ethics 101.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Β 
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
international classification of diseases ICD-10 review PPT.pptx

Cryptography ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On CRYPTOGRAPHY
  • 2. Index ο‚— Introduction ο‚— What is Cryptography? ο‚— Purpose Of cryptography ο‚— Architecture of cryptography ο‚— Types of Cryptography ο‚— Process of cryptography ο‚— Types Of cryptography Algorithms Attacks of cryptography ο‚— Conclusion ο‚— References
  • 3. INTRODUCTION ο‚— The Internet or the global Internet is the internationally connected network of computer networks with addresses that are administrated by IANA (Internet address and Naming Authority). ο‚— There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography.
  • 4. What is Cryptography? ο‚— Cryptography derived its name from a Greek word called β€œkrypto’s” which means β€œHidden Secrets”. ο‚— Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. ο‚— It provides Confidentiality, Integrity, and Accuracy.
  • 5. PURPOSE OF CRYPTOGRAPHY ο‚— Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.) ο‚— Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. ο‚— Integrity: Assuring the receiver that the received message has not been altered in any way from the original. ο‚— Non-repudiation: A mechanism to prove that the sender really sent this message.
  • 7. Types of Cryptography Secret Key Cryptography β€’ Single key used to encrypt and decrypt. β€’ Key must be known by both parties. β€’ Assuming we live in a hostile environment (otherwise - why the need for cryptography?), it may be hard to share a secret key.
  • 8. Public Key Cryptography ο‚— One of the keys allocated to each person is called the "public key", and is published in an open directory somewhere where anyone can easily look it up, for example by email address. ο‚— Each entity has 2 keys: ο‚— Private Key (a secret) ο‚— Public key (well known).
  • 9. Using Keys ο‚— Private keys are used for decrypting. ο‚— Public keys are used for encrypting.
  • 12. Public/Private Key Cryptography ο‚§ Asymmetric key cryptography overcomes the key management problem by using different encryption and decryption key pairs. Having knowledge of one key, say the encryption key, is not sufficient enough to determine the other key - the decryption key. ο‚§ The mathematical relationship between the public/private key pair permits a general rule: any message encrypted with one key of the pair can be successfully decrypted only with that key's counterpart.
  • 13. Hash functions ο‚— Is a type of one-way function this are fundamental for much of cryptography. ο‚— A one way function - is a function that is easy to calculate but hard to invert. ο‚— It is difficult to calculate the input to the function given its output. ο‚— The precise meanings of "easy" and "hard" can be specified mathematically. With rare exceptions, almost the entire field of public key cryptography rests on the existence of one-way functions.
  • 14. Attacks of cryptography Cipher text only attack ο‚§ The only data available is a target cipher text Known plaintext attack ο‚§ A target cipher text ο‚§ Pairs of other cipher text and plaintext (say, previously broken or guessing)
  • 15. Attacks of cryptography… Chosen plaintext attacks ο‚§ A target cipher text ο‚· Can feed encryption algorithm with plaintexts and obtain the matching cipher texts Chosen cipher text attack ο‚§ A target cipher text ο‚§ Can feed decryption algorithm with cipher texts and obtain the matching plaintext matching cipher texts
  • 16. CONCLUSION ο‚— We use different types of algorithms to establish security services in different service mechanisms. ο‚— We use either private key cryptography or public key cryptography according to requirement. ο‚— If we want to send message quickly we use private key algorithm and if we want to send messages secretly we use public key algorithm.

Editor's Notes