SlideShare a Scribd company logo
2
Most read
3
Most read
16
Most read
SAVYA SACHI
MUZAFFARPUR INSTITUTE OF
TECHNOLOGY
Mu z a ffar pur
Basic Concepts
Cryptography: The art or science encompassing the principles
and methods of transforming an intelligible message into one
that is unintelligible, and then retransforming that message back
to its original form.
Plaintext: The original intelligible message
Cipher text: The transformed (coded) message
Cipher: An algorithm for transforming an intelligible message
into one that is unintelligible by transposition and/or substitution
methods Key : Some critical information used by the cipher,
known only to the sender & receiver
Encipher (encode): The process of converting plaintext to
cipher text using a cipher and a key
Decipher (decode): the process of converting cipher text
back into plaintext using a cipher and a key
• Cryptanalysis: The study of principles and
methods of transforming an unintelligible
message back into an intelligible message
without knowledge of the key. Also called
code breaking
• Cryptology: Both cryptography and
cryptanalysis
• Code: An algorithm for transforming an
intelligible message into an unintelligible
one using a code-book
Basic Terms Used in Cryptography
1) Plain Text- The original message that is easily readable by humans. It is a term
used in cryptography that refers to a message before encryption or after
decryption. For example, A is a person wishes to send “Hello Friend how are
you” message to the person B. Here “Hello Friend how are you” is a plain text
message.
2) 2) Cipher Text- In cryptography, cipher text is data that has been encrypted. This
text is unreadable until it has been converted into plain text with a key. For
example, “phqgiumealy” is a cipher text produced for “abcdefghijk”.
3) 3) Encryption- It is security tool for computer network. It is process of converting
information (known as plain text ) using an algorithm to make it unreadable
(known as cipher text) to anyone except those processing special knowledge,
usually referred to as a key. It is the most efficient method to achieve data
security. Encryption can protect confidentiality of message. For data encryption,
a secret key is used. Encrypted data is called as cipher text and decrypted data
is called as plain text.
4) Decryption- It is process of taking encoded or encrypted text and converting it
back into original text. Decryption is used for un-encrypting the data with keys or
algorithm. Cryptography uses the decryption technique at the receiver side to
obtain the original message from non-readable message (Cipher Text). The
decryption process requires two things- a Decryption algorithm and a key. A
Decryption algorithm indicates the technique that has been used in Decryption.
Usually, the encryption and decryption algorithm are same.
1) 5) Key- A key is a numeric or alpha numeric text or may be a special symbol.
The Key is used at the time of encryption work on the plain text and at the time
of decryption work on the cipher text. The selection of key plays vital rolein
cryptography process as the security of encryption algorithm fully depends on
it. For example, if A uses a key of 2 to encrypt the Plain Text “University” then
Cipher Text produced will be “wpkxgtkva”.
Encryption
Encryption
Encryption
Encryption
Encryption
Encryption
Encryption
Encryption
• A. Symmetric Encryption- This type of cryptography
uses a single key, which is used for encryption and
decryption. The sender uses the key to encrypt the
plaintext and sends the cipher text to the receiver. At
the receiver side, same key will be used to decrypt
the message and get the plaintext. Because there is
common key used for encryption and decryption
process, the secret key cryptography is also known as
symmetric encryption. This was the only type of
encryption method widely known until June 1976.
There are various symmetric key algorithms such as
DES, TRIPLE DES, AES, RC4, RC6, and BLOWFISH
[2].
• B. Asymmetric Encryption- Public-key cryptography,
where key used to encrypt a message is differ from
key used to decrypt a message. In asymmetric or
public-key cryptography, there are two cryptographic
keys: a private key and a public key are used. The
private key is kept secret, while public key may be
distributed. Messages are encrypted with recipients’
public key and decrypted with private key. Some
commonly used asymmetric cryptography techniques
are RSA (Rivest Shamir and Adleman), Diffie-Hellman,
and DSA (Digital Signature Algorithm).
• A significant disadvantage of symmetric ciphers is the key
management necessary to use them securely. Each distinct
pair of communicating parties must, ideally, share a different
key, and perhaps each cipher text exchanged as well. The
number of keys required increases as the square of the
number of network members, which very quickly requires
complex key management schemes to keep them all straight
and secret.
CLASSIFICATION OF CRYPTOGRAPHY: The encryption
algorithms are classified into two broad categories: Symmetric Key and
Asymmetric Key encryption as shown
below/
CRYPTOGRAPHY
SYMMETRIC ASYMMETRIC
DES AES RC4/RC6 RSA DSA Diffie-Hellman
17

More Related Content

PPTX
Cryptography by manisha jha
PPT
Cryptography 1
PPTX
Basic cryptography
PPTX
Cryptography
PPT
Network Security and Cryptography
PPTX
Cryptography
PPSX
Cryptography
PPTX
cryptography ppt free download
Cryptography by manisha jha
Cryptography 1
Basic cryptography
Cryptography
Network Security and Cryptography
Cryptography
Cryptography
cryptography ppt free download

What's hot (20)

PPTX
Introduction to Cryptography
PPTX
Encryption algorithms
PPT
Encryption And Decryption
 
PPTX
Cryptography and network security
PPTX
Cryptography
PPT
PDF
Cryptography in Python
DOC
Cryptography full report
PPT
Cryptography
PDF
Introduction to Cryptography
PPSX
5 Cryptography Part1
PPT
Cryptography
PPTX
Overview of cryptography
PPTX
Encryption
PPT
Cryptography ppt
PPTX
Topic1 substitution transposition-techniques
PPTX
Cryptography
PPTX
Network security and cryptography
PPTX
Cryptography
PPS
Criptography
Introduction to Cryptography
Encryption algorithms
Encryption And Decryption
 
Cryptography and network security
Cryptography
Cryptography in Python
Cryptography full report
Cryptography
Introduction to Cryptography
5 Cryptography Part1
Cryptography
Overview of cryptography
Encryption
Cryptography ppt
Topic1 substitution transposition-techniques
Cryptography
Network security and cryptography
Cryptography
Criptography
Ad

Similar to Encryption (20)

PDF
UNIT 3 Information Security Sharad Institute
PDF
Information Security 05- Encryption.pdfn
PPTX
Introduction to Cryptography for btech cse
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PDF
Basic Cryptography.pdf
PPTX
groupWork.pptx
PPTX
Basics of Cryptography presentation.pptx
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PDF
A Study On Cryptographic Techniques
PPTX
Cryptography
PPT
Fundamentals of cryptography
PPTX
Data encryption
PDF
Evolution of Cryptography and Cryptographic techniques
PPTX
Cryptography by Durlab Kumbhakar
PDF
chapter 1-4.pdf
PDF
information technology cryptography Msc chapter 1-4.pdf
PPT
Chapter 2 part 1.ppt
PPTX
Encryption33.pptx
PDF
Pertemuan 4 information hiding (cryptography)
PPT
cryptography
UNIT 3 Information Security Sharad Institute
Information Security 05- Encryption.pdfn
Introduction to Cryptography for btech cse
A Survey on Cryptographic Techniques for Network Security.pdf
Basic Cryptography.pdf
groupWork.pptx
Basics of Cryptography presentation.pptx
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A Study On Cryptographic Techniques
Cryptography
Fundamentals of cryptography
Data encryption
Evolution of Cryptography and Cryptographic techniques
Cryptography by Durlab Kumbhakar
chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
Chapter 2 part 1.ppt
Encryption33.pptx
Pertemuan 4 information hiding (cryptography)
cryptography
Ad

More from Savyasachi14 (8)

PDF
Cryptanalysis by savyasachi
PPTX
Goals of security
PDF
Software design
PPT
System requirements specification (srs)
PPTX
Alpha beta pruning in ai
PPTX
Object modeling techniques by savyasachi
PPT
PDF
Software testing ppt
Cryptanalysis by savyasachi
Goals of security
Software design
System requirements specification (srs)
Alpha beta pruning in ai
Object modeling techniques by savyasachi
Software testing ppt

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
composite construction of structures.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
UNIT 4 Total Quality Management .pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Lecture Notes Electrical Wiring System Components
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mechanical Engineering MATERIALS Selection
OOP with Java - Java Introduction (Basics)
Arduino robotics embedded978-1-4302-3184-4.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
composite construction of structures.pdf
Foundation to blockchain - A guide to Blockchain Tech
UNIT 4 Total Quality Management .pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Lecture Notes Electrical Wiring System Components
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Encryption

  • 1. SAVYA SACHI MUZAFFARPUR INSTITUTE OF TECHNOLOGY Mu z a ffar pur
  • 2. Basic Concepts Cryptography: The art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible, and then retransforming that message back to its original form. Plaintext: The original intelligible message Cipher text: The transformed (coded) message Cipher: An algorithm for transforming an intelligible message into one that is unintelligible by transposition and/or substitution methods Key : Some critical information used by the cipher, known only to the sender & receiver Encipher (encode): The process of converting plaintext to cipher text using a cipher and a key Decipher (decode): the process of converting cipher text back into plaintext using a cipher and a key
  • 3. • Cryptanalysis: The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key. Also called code breaking • Cryptology: Both cryptography and cryptanalysis • Code: An algorithm for transforming an intelligible message into an unintelligible one using a code-book
  • 4. Basic Terms Used in Cryptography 1) Plain Text- The original message that is easily readable by humans. It is a term used in cryptography that refers to a message before encryption or after decryption. For example, A is a person wishes to send “Hello Friend how are you” message to the person B. Here “Hello Friend how are you” is a plain text message. 2) 2) Cipher Text- In cryptography, cipher text is data that has been encrypted. This text is unreadable until it has been converted into plain text with a key. For example, “phqgiumealy” is a cipher text produced for “abcdefghijk”. 3) 3) Encryption- It is security tool for computer network. It is process of converting information (known as plain text ) using an algorithm to make it unreadable (known as cipher text) to anyone except those processing special knowledge, usually referred to as a key. It is the most efficient method to achieve data security. Encryption can protect confidentiality of message. For data encryption, a secret key is used. Encrypted data is called as cipher text and decrypted data is called as plain text. 4) Decryption- It is process of taking encoded or encrypted text and converting it back into original text. Decryption is used for un-encrypting the data with keys or algorithm. Cryptography uses the decryption technique at the receiver side to obtain the original message from non-readable message (Cipher Text). The decryption process requires two things- a Decryption algorithm and a key. A Decryption algorithm indicates the technique that has been used in Decryption. Usually, the encryption and decryption algorithm are same.
  • 5. 1) 5) Key- A key is a numeric or alpha numeric text or may be a special symbol. The Key is used at the time of encryption work on the plain text and at the time of decryption work on the cipher text. The selection of key plays vital rolein cryptography process as the security of encryption algorithm fully depends on it. For example, if A uses a key of 2 to encrypt the Plain Text “University” then Cipher Text produced will be “wpkxgtkva”.
  • 14. • A. Symmetric Encryption- This type of cryptography uses a single key, which is used for encryption and decryption. The sender uses the key to encrypt the plaintext and sends the cipher text to the receiver. At the receiver side, same key will be used to decrypt the message and get the plaintext. Because there is common key used for encryption and decryption process, the secret key cryptography is also known as symmetric encryption. This was the only type of encryption method widely known until June 1976. There are various symmetric key algorithms such as DES, TRIPLE DES, AES, RC4, RC6, and BLOWFISH [2].
  • 15. • B. Asymmetric Encryption- Public-key cryptography, where key used to encrypt a message is differ from key used to decrypt a message. In asymmetric or public-key cryptography, there are two cryptographic keys: a private key and a public key are used. The private key is kept secret, while public key may be distributed. Messages are encrypted with recipients’ public key and decrypted with private key. Some commonly used asymmetric cryptography techniques are RSA (Rivest Shamir and Adleman), Diffie-Hellman, and DSA (Digital Signature Algorithm). • A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each cipher text exchanged as well. The number of keys required increases as the square of the number of network members, which very quickly requires complex key management schemes to keep them all straight and secret.
  • 16. CLASSIFICATION OF CRYPTOGRAPHY: The encryption algorithms are classified into two broad categories: Symmetric Key and Asymmetric Key encryption as shown below/ CRYPTOGRAPHY SYMMETRIC ASYMMETRIC DES AES RC4/RC6 RSA DSA Diffie-Hellman
  • 17. 17