SlideShare a Scribd company logo
Kishansinh Rathod
Roll No – 4042
MSC-I
 Cryptography derived its name from a Greek
word called “Kryptos” which mean “Hidden
Secrets”.
 It is the practice and study of hiding
information. It is the science used to try to
keep information secret and safe.
 ENCRYPTION / DECRYPTION
 PLAIN TEXT
 CIPHER TEXT
 KEYS
 Encryption
 The process of converting a plain text
message into a cipher text message i.e. non-
readable format with the help of a secret
key is called encryption
 Decryption
 The process of converting cipher text to
plain text is called decryption.
Introduction to Cryptography
Symmetric
Asymmetric
 In this type of Encryption, both sender and
receiver will use same key to Encrypt and
Decrypt information.
Introduction to Cryptography
 In this type of Encryption, a pair of keys
known as Public Key and Private Key is used.
As name indicates, Public Key is shared and
known to everyone where as Private Key is
with the person himself.
Introduction to Cryptography
Introduction to Cryptography

More Related Content

PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Encryption algorithms
PPTX
Overview of cryptography
PPTX
Cryptography and network security
PPTX
Intro to modern cryptography
PPTX
Cryptography
PPT
Encryption And Decryption
 
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Encryption algorithms
Overview of cryptography
Cryptography and network security
Intro to modern cryptography
Cryptography
Encryption And Decryption
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY

What's hot (20)

PPT
Public Key Cryptography
PPTX
Cryptography.ppt
PPT
CONVENTIONAL ENCRYPTION
PDF
IP Security
PPT
Network security cryptography ppt
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPT
PPTX
Cryptography
PPTX
IP Security
PPT
Cryptography and Network Security
PPTX
Cryptography and Network Security
PPTX
Cryptographic tools
 
PPTX
Encryption ppt
PPT
Cryptography
PDF
Introduction to Cryptography
PPTX
Cryptographic algorithms
PPTX
Block cipher modes of operation
PPT
Fundamentals of cryptography
PPT
Network security cryptographic hash function
Public Key Cryptography
Cryptography.ppt
CONVENTIONAL ENCRYPTION
IP Security
Network security cryptography ppt
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography
IP Security
Cryptography and Network Security
Cryptography and Network Security
Cryptographic tools
 
Encryption ppt
Cryptography
Introduction to Cryptography
Cryptographic algorithms
Block cipher modes of operation
Fundamentals of cryptography
Network security cryptographic hash function
Ad

Viewers also liked (11)

PPT
Cryptography Introduction
PDF
Introduction to cryptography
PDF
Introduction to cryptography
PPTX
Cryptography
PPT
رمزنگاری
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPT
introduction to cryptography
PDF
Introduction to Cryptography
PDF
Introduction to Cryptography Part I
PPT
Cryptography Intro
Cryptography Introduction
Introduction to cryptography
Introduction to cryptography
Cryptography
رمزنگاری
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
introduction to cryptography
Introduction to Cryptography
Introduction to Cryptography Part I
Cryptography Intro
Ad

Similar to Introduction to Cryptography (20)

PPTX
Cryptography
PPTX
Cryptography
PDF
UNIT 3 Information Security Sharad Institute
PDF
Encryption
PPT
cryptography
PPTX
Cryptography in networks
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Cryptography by manisha jha
PPTX
cryptography
PPTX
cryptography in computer and its module and application
PDF
PresentationonCRYPTOGRAPHYppt.pdf
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
Crytography
PPTX
Technical Seminar. cryptography ppt for college
PPTX
Cryptography.ppt
PPTX
Cryptography.pptx
DOCX
Seminar report on symmetric key
PPTX
Basics of Cryptography presentation.pptx
PPTX
CRYPTOGRAPHY and its applications .pptx
Cryptography
Cryptography
UNIT 3 Information Security Sharad Institute
Encryption
cryptography
Cryptography in networks
Detailed description about the concept of E Commerce UNIT IV.pptx
Cryptography by manisha jha
cryptography
cryptography in computer and its module and application
PresentationonCRYPTOGRAPHYppt.pdf
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Crytography
Technical Seminar. cryptography ppt for college
Cryptography.ppt
Cryptography.pptx
Seminar report on symmetric key
Basics of Cryptography presentation.pptx
CRYPTOGRAPHY and its applications .pptx

Recently uploaded (20)

PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PPTX
BIOMOLECULES PPT........................
PDF
Placing the Near-Earth Object Impact Probability in Context
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PDF
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
PDF
The scientific heritage No 166 (166) (2025)
PDF
Assessment of environmental effects of quarrying in Kitengela subcountyof Kaj...
PPT
1. INTRODUCTION TO EPIDEMIOLOGY.pptx for community medicine
PDF
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
PPTX
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
PPT
6.1 High Risk New Born. Padetric health ppt
PPTX
Overview of calcium in human muscles.pptx
PPTX
Biomechanics of the Hip - Basic Science.pptx
PPTX
Application of enzymes in medicine (2).pptx
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
Phytochemical Investigation of Miliusa longipes.pdf
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
BIOMOLECULES PPT........................
Placing the Near-Earth Object Impact Probability in Context
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
The scientific heritage No 166 (166) (2025)
Assessment of environmental effects of quarrying in Kitengela subcountyof Kaj...
1. INTRODUCTION TO EPIDEMIOLOGY.pptx for community medicine
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
POULTRY PRODUCTION AND MANAGEMENTNNN.pptx
6.1 High Risk New Born. Padetric health ppt
Overview of calcium in human muscles.pptx
Biomechanics of the Hip - Basic Science.pptx
Application of enzymes in medicine (2).pptx
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...

Introduction to Cryptography

  • 1. Kishansinh Rathod Roll No – 4042 MSC-I
  • 2.  Cryptography derived its name from a Greek word called “Kryptos” which mean “Hidden Secrets”.  It is the practice and study of hiding information. It is the science used to try to keep information secret and safe.
  • 3.  ENCRYPTION / DECRYPTION  PLAIN TEXT  CIPHER TEXT  KEYS
  • 4.  Encryption  The process of converting a plain text message into a cipher text message i.e. non- readable format with the help of a secret key is called encryption
  • 5.  Decryption  The process of converting cipher text to plain text is called decryption.
  • 8.  In this type of Encryption, both sender and receiver will use same key to Encrypt and Decrypt information.
  • 10.  In this type of Encryption, a pair of keys known as Public Key and Private Key is used. As name indicates, Public Key is shared and known to everyone where as Private Key is with the person himself.