SlideShare a Scribd company logo
Galgotias University 1
Introduction to Cryptography
Session No.: 1
Course Name: Fundamentals of Cryptography
Course Code: EIUA408B
Instructor Name: Aishwarya
Duration: 50 min
Galgotias University 2
Course Objective
1. Introduce students to fundamental security principles, various types of
attacks, and the importance of secure communication.
2. Study symmetric and asymmetric encryption methods, including
substitution, transposition, and modern encryption standards.
3. Analyze symmetric and asymmetric encryption algorithms along with
cryptanalysis techniques.
4. Can apply Hash function in message authentication
5. Develop problem-solving skills in cryptographic implementations and
security management in real-world scenarios.
Galgotias University 3
Course Outcomes
CO NO. COURSE OUTCOMES
EIUA408B.1
Explain the security principles, various types of attacks, and
the importance of secure communication.
EIUA408B.2 Describe symmetric and asymmetric encryption methods
EIUA408B.3 Analyse symmetric and asymmetric encryption algorithms
along with cryptanalysis techniques.
EIUA408B.4 Can apply and evaluate Hash function in message
authentication
EIUA408B.5 Develop problem-solving skills in cryptographic
implementations and security management in real-world
scenarios.
Galgotias University 4
Course Assessment
Galgotias University 5
A. Basic Concepts of Security
B. Need of Security
C. What is Information
Recap
Galgotias University 6
Ques?
When you send a message to a friend, how can you be sure
that no one else is reading it?
Galgotias University 7
Opening Question?
Have you ever wondered how your passwords stay safe when
logging into a website?
Galgotias University 8
LEARNING
OUTCOMES
LO1
• Define Information security and explain its
importance in protecting data and systems
LO2
• Describe the key Security requirements of
confidentiality, integrity, and availability.
At the end of this session students will be able to
Galgotias University 9
Session
Outline
1. Basic terminologies in Security
2. Learning Concept of Activity 1
3. A1(TPS): Why security is important
4. Learning Concept of Activity 2
5. A2 (Case Based Study):Real-World
Problem Analysis.
6. Conclusion & Closing Activity
Galgotias University 10
Concept and
Definition for
Learning Activity 1
Galgotias University 11
Information Security: is a set of security procedures and tools that broadly protect sensitive
enterprise information from misuse, unauthorized access, disruption, or destruction
Network Security: Network security is any activity designed to protect the usability and
integrity of your network and data. Network security is the practice of protecting a computer
network from unauthorized access, misuse, or attacks
Cybersecurity is the protection of information that is stored, transmitted, and processed in a
networked system of computers, other digital devices, and network devices and transmission lines,
including the Internet
Galgotias University 12
Learning Activity 1(10 min)
: Ask students to reflect individually
on information security and its role in protecting
data and systems
.
THINK (2 min)
: Students pair up and discuss
their thoughts. (3 min)
PAIR (3 min)
:Pairs share their conclusions with
the class. (5 min)
SHARE (5 min)
Galgotias University 13
Quiz on Wooclap
Galgotias University 14
Concept and
Definition for
Learning Activity 2
Galgotias University 15
Galgotias University 16
CIA Traid
Galgotias University 17
Confidentiality
What it means: Only the authorized users should access the data.
Example: Your phone’s password ensures only you can unlock it.
Data confidentiality: Assures that private or confidential
information is not made available or disclosed to unauthorized
individuals
This term covers two related concepts:
Privacy: Ensures that individuals have control over the collection, storage,
and disclosure of their personal data through data privacy policies, access
controls, and regulatory compliance mechanisms.
Galgotias University 18
Integrity
What it means: Data should not be changed or tampered with incorrectly.
Example: A bank transfer of $100 should not change to $1,000 due to an error
or hacking
Data integrity ensures that data is modified only in authorized
ways and remains accurate and trustworthy. It also includes
authenticity (verifying data's legitimacy) and non-repudiation
(proof of sender and recipient identity).
This term covers two related concepts:
System integrity: Assures that a system performs its intended function in
an unimpaired manner, free from deliberate or inadvertent unauthorized
manipulation of the system.
Galgotias University 19
Availability
What it means: Data should be available when needed.
Example: If an ATM system crashes, customers won’t be able to withdraw
money
Assures that systems work promptly and service is not denied to
authorized users
20
Galgotias University
Learning Activity 2(Case Study-10 min)
Scenario 1: Unauthorized Access to Patient Records(Confidentiality)
Situation: A hospital’s database containing patient medical records is
hacked because employees used weak passwords.
Scenario 2: Online Banking Transaction Tampering (Integrity Breach)
Situation: A hacker intercepts an online banking transaction and changes
the transferred amount from $500 to $5,000
Scenario 1: Airline Ticketing System Crash(Availability)
Situation: An airline's online booking system crashes during a holiday
sale, preventing customers from booking flights.
Galgotias University 21
Reflection : Learning Activity 2
GroupWise Written Reflection (3-5 min)- Open Ques on
Wooclap
Galgotias University 22
Summary
A. Information Security protects data from unauthorized access, modification,
and unavailability.
B. Confidentiality ensures that only authorized users can access sensitive
information (e.g., encryption, access control).
C. Integrity maintains data accuracy and prevents unauthorized changes (e.g.,
hashing, digital signatures).
D. Availability ensures systems and data remain accessible when needed (e.g.,
backups, disaster recovery).
E. CIA Triad forms the foundation of cybersecurity, helping prevent data
breaches, fraud, and service disruptions.
Galgotias University 23
Ensure attainment of LOs in alignment to the
learning activities: outcomes (1-2)
LO1: Define Information security and explain its
importance in protecting data and systems
LO2Describe the key Security requirements of
confidentiality, integrity, and availability.
Galgotias University 24
Discussion on the post session
activities
Attempt the Post-session activity on LMS, before next session
Galgotias University 25
Information to next topic of the
course
Next session:
The need for security, Security Approaches,
Principles of Security, Types of Attacks
Galgotias University 26
Review and Reflection
from students
https://gulms.galgotiasuniversity.org/mod/
feedback/view.php?id=41919
Galgotias University 27

More Related Content

PPTX
Need of Security , Security Approaches, Principles of Security
PPTX
Types of Attacks: Attacks can be classified based on their method, target, or...
PPTX
introduction of cryptography and its applications
PPT
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
DOCX
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
PPTX
1. Introduction to Information Security.pptx
PDF
IS-Intro.pdf
 
PDF
Information Security in term of computer science
Need of Security , Security Approaches, Principles of Security
Types of Attacks: Attacks can be classified based on their method, target, or...
introduction of cryptography and its applications
ICSE6104 Lecturedfffffffffffffffffffff 1.ppt
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
1. Introduction to Information Security.pptx
IS-Intro.pdf
 
Information Security in term of computer science

Similar to Fundamental to Cryptography_Introduction (20)

PPTX
cryptography.pptx
PPT
ch_01 Introduction.ppt ( information cyber security)
PPTX
Cyber Security Unit I Part -I.pptx
PPT
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
PDF
cryptograph and computer security lecture 1.pdf
PPTX
Dr_Kamal_ch01.pptx
PPT
Data security & cryptography
DOCX
IS_Syllabus_4_credits_2018.docx
PPTX
Week 9- 1 information security slides.pptx
PPT
M.Florence Dayana/Cryptography and Network security
PDF
Information Security Concepts.pdf
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
PPT
engineering cryptography 21ECE73 Module-3 (2).pptx
PPT
information security importance and use.ppt
PPT
formintroduction to ISF.ppt ination security fundamentals
PPT
Lecture15.ppt
PPTX
Information-Security_System_Notes__.pptx
DOCX
CHAPTER 9 Design Considerations In this chapter you will
PPTX
COMPUTER SECURITY in Information Security
PPTX
Introduction to Information Systems Security
cryptography.pptx
ch_01 Introduction.ppt ( information cyber security)
Cyber Security Unit I Part -I.pptx
CNS UNIT 1 NEW NEW UNIT has been s 1.ppt
cryptograph and computer security lecture 1.pdf
Dr_Kamal_ch01.pptx
Data security & cryptography
IS_Syllabus_4_credits_2018.docx
Week 9- 1 information security slides.pptx
M.Florence Dayana/Cryptography and Network security
Information Security Concepts.pdf
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
engineering cryptography 21ECE73 Module-3 (2).pptx
information security importance and use.ppt
formintroduction to ISF.ppt ination security fundamentals
Lecture15.ppt
Information-Security_System_Notes__.pptx
CHAPTER 9 Design Considerations In this chapter you will
COMPUTER SECURITY in Information Security
Introduction to Information Systems Security
Ad

More from NAtional Institute of TEchnology Rourkela , Galgotias University (20)

PDF
Greenhouse Gases, Acid Rain, Ozone Layer depletion
PDF
Environment Air Pollution: Causes & Solutions
PPTX
String Matching Algorithms: Naive, KMP, Rabin-Karp
PDF
Bitcoin Basics: Wallets, Transactions, and Double Spending Explained
PPTX
The Foundation of Smart Contract Development on Ethereum
PPTX
Understanding Consensus Mechanisms in Blockchain: Proof of Work, Proof of Sta...
PPTX
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
PPTX
Types of Cryptography: Secret Key and Asymmetric Key
PPTX
Classical Cryptogtaphy Techniques: Ceaser Cipher
PPTX
Introduction to DBMS(Database Management System)
PPTX
Database Management System_Overall Structure
PDF
Introduction to Algorithm, Analysis of Algorithm
PPTX
2. Unit 1_Types of Opertaing Systems.pptx
PPTX
Greenhouse Gases, Acid Rain, Ozone Layer depletion
Environment Air Pollution: Causes & Solutions
String Matching Algorithms: Naive, KMP, Rabin-Karp
Bitcoin Basics: Wallets, Transactions, and Double Spending Explained
The Foundation of Smart Contract Development on Ethereum
Understanding Consensus Mechanisms in Blockchain: Proof of Work, Proof of Sta...
Blockchain Technology Explained: A Beginner's Guide to the Future of the Inte...
Types of Cryptography: Secret Key and Asymmetric Key
Classical Cryptogtaphy Techniques: Ceaser Cipher
Introduction to DBMS(Database Management System)
Database Management System_Overall Structure
Introduction to Algorithm, Analysis of Algorithm
2. Unit 1_Types of Opertaing Systems.pptx
Ad

Recently uploaded (20)

PPTX
web development for engineering and engineering
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Well-logging-methods_new................
PDF
PPT on Performance Review to get promotions
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Digital Logic Computer Design lecture notes
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPT
Project quality management in manufacturing
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Construction Project Organization Group 2.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
web development for engineering and engineering
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Well-logging-methods_new................
PPT on Performance Review to get promotions
Structs to JSON How Go Powers REST APIs.pdf
Digital Logic Computer Design lecture notes
Operating System & Kernel Study Guide-1 - converted.pdf
Project quality management in manufacturing
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Construction Project Organization Group 2.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Internet of Things (IOT) - A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...

Fundamental to Cryptography_Introduction

  • 1. Galgotias University 1 Introduction to Cryptography Session No.: 1 Course Name: Fundamentals of Cryptography Course Code: EIUA408B Instructor Name: Aishwarya Duration: 50 min
  • 2. Galgotias University 2 Course Objective 1. Introduce students to fundamental security principles, various types of attacks, and the importance of secure communication. 2. Study symmetric and asymmetric encryption methods, including substitution, transposition, and modern encryption standards. 3. Analyze symmetric and asymmetric encryption algorithms along with cryptanalysis techniques. 4. Can apply Hash function in message authentication 5. Develop problem-solving skills in cryptographic implementations and security management in real-world scenarios.
  • 3. Galgotias University 3 Course Outcomes CO NO. COURSE OUTCOMES EIUA408B.1 Explain the security principles, various types of attacks, and the importance of secure communication. EIUA408B.2 Describe symmetric and asymmetric encryption methods EIUA408B.3 Analyse symmetric and asymmetric encryption algorithms along with cryptanalysis techniques. EIUA408B.4 Can apply and evaluate Hash function in message authentication EIUA408B.5 Develop problem-solving skills in cryptographic implementations and security management in real-world scenarios.
  • 5. Galgotias University 5 A. Basic Concepts of Security B. Need of Security C. What is Information Recap
  • 6. Galgotias University 6 Ques? When you send a message to a friend, how can you be sure that no one else is reading it?
  • 7. Galgotias University 7 Opening Question? Have you ever wondered how your passwords stay safe when logging into a website?
  • 8. Galgotias University 8 LEARNING OUTCOMES LO1 • Define Information security and explain its importance in protecting data and systems LO2 • Describe the key Security requirements of confidentiality, integrity, and availability. At the end of this session students will be able to
  • 9. Galgotias University 9 Session Outline 1. Basic terminologies in Security 2. Learning Concept of Activity 1 3. A1(TPS): Why security is important 4. Learning Concept of Activity 2 5. A2 (Case Based Study):Real-World Problem Analysis. 6. Conclusion & Closing Activity
  • 10. Galgotias University 10 Concept and Definition for Learning Activity 1
  • 11. Galgotias University 11 Information Security: is a set of security procedures and tools that broadly protect sensitive enterprise information from misuse, unauthorized access, disruption, or destruction Network Security: Network security is any activity designed to protect the usability and integrity of your network and data. Network security is the practice of protecting a computer network from unauthorized access, misuse, or attacks Cybersecurity is the protection of information that is stored, transmitted, and processed in a networked system of computers, other digital devices, and network devices and transmission lines, including the Internet
  • 12. Galgotias University 12 Learning Activity 1(10 min) : Ask students to reflect individually on information security and its role in protecting data and systems . THINK (2 min) : Students pair up and discuss their thoughts. (3 min) PAIR (3 min) :Pairs share their conclusions with the class. (5 min) SHARE (5 min)
  • 14. Galgotias University 14 Concept and Definition for Learning Activity 2
  • 17. Galgotias University 17 Confidentiality What it means: Only the authorized users should access the data. Example: Your phone’s password ensures only you can unlock it. Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals This term covers two related concepts: Privacy: Ensures that individuals have control over the collection, storage, and disclosure of their personal data through data privacy policies, access controls, and regulatory compliance mechanisms.
  • 18. Galgotias University 18 Integrity What it means: Data should not be changed or tampered with incorrectly. Example: A bank transfer of $100 should not change to $1,000 due to an error or hacking Data integrity ensures that data is modified only in authorized ways and remains accurate and trustworthy. It also includes authenticity (verifying data's legitimacy) and non-repudiation (proof of sender and recipient identity). This term covers two related concepts: System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
  • 19. Galgotias University 19 Availability What it means: Data should be available when needed. Example: If an ATM system crashes, customers won’t be able to withdraw money Assures that systems work promptly and service is not denied to authorized users
  • 20. 20 Galgotias University Learning Activity 2(Case Study-10 min) Scenario 1: Unauthorized Access to Patient Records(Confidentiality) Situation: A hospital’s database containing patient medical records is hacked because employees used weak passwords. Scenario 2: Online Banking Transaction Tampering (Integrity Breach) Situation: A hacker intercepts an online banking transaction and changes the transferred amount from $500 to $5,000 Scenario 1: Airline Ticketing System Crash(Availability) Situation: An airline's online booking system crashes during a holiday sale, preventing customers from booking flights.
  • 21. Galgotias University 21 Reflection : Learning Activity 2 GroupWise Written Reflection (3-5 min)- Open Ques on Wooclap
  • 22. Galgotias University 22 Summary A. Information Security protects data from unauthorized access, modification, and unavailability. B. Confidentiality ensures that only authorized users can access sensitive information (e.g., encryption, access control). C. Integrity maintains data accuracy and prevents unauthorized changes (e.g., hashing, digital signatures). D. Availability ensures systems and data remain accessible when needed (e.g., backups, disaster recovery). E. CIA Triad forms the foundation of cybersecurity, helping prevent data breaches, fraud, and service disruptions.
  • 23. Galgotias University 23 Ensure attainment of LOs in alignment to the learning activities: outcomes (1-2) LO1: Define Information security and explain its importance in protecting data and systems LO2Describe the key Security requirements of confidentiality, integrity, and availability.
  • 24. Galgotias University 24 Discussion on the post session activities Attempt the Post-session activity on LMS, before next session
  • 25. Galgotias University 25 Information to next topic of the course Next session: The need for security, Security Approaches, Principles of Security, Types of Attacks
  • 26. Galgotias University 26 Review and Reflection from students https://gulms.galgotiasuniversity.org/mod/ feedback/view.php?id=41919

Editor's Notes

  • #23: Conclusion: 1 min [46]
  • #24: * Share / Discuss details – 1 min [47]
  • #25: Conclusion: 1 min [48]
  • #26: Conclusion: 2 min [50]