SlideShare a Scribd company logo
Cryptographic
Algorithms
Mrs.G.Chandraprabha.,M.Sc.,M.Phil.,
Assistant Professor
Department of Information Technology,
V.V.Vanniaperumal College for Women,
Virudhunagar.
Cryptograpy:
The term is derived from the Greek word kryptos, which means hidden.
Cryptographic Algorithms:
Cryptographic algorithms are used for important tasks such as data
encryption, authentication, and digital signatures.
Encryption & Decryption
The process of converting plaintext into ciphertext.
 The process of converting ciphertext into plaintext.
Symmetric Encrption
 Symmetric encryption is an encryption methodology that uses a
single key to encrypt (encode) and decrypt (decode) data
There are five main components :
 plaintext
 encryption algorithm
 secret key
 Cipher text
 decryption algorithm
Symmetric Encrption
1. Plaintext
The term plaintext refers to the
original message that's created
and sent into the encryption
method
2. Encryption Algorithm
The encryption algorithm takes the plaintext and
converts it into an unreadable format.
3. Key
The key holds the information on all
the switches and substitutions
made to the original plain text.
4. Cipher text
The cipher text is the text that is now
scrambled and ready to be sent
5. Decryption Algorithm
Basically performing the encryption in reverse.
Two of the most common symmetric encryption
1. Data Encryption Standard (DES) :
 The algorithm takes the plain text in 64-bit blocks and converts them into cipher text using 48-
bit keys.
 Smart cards
 SIM cards
 Modems
 Routers
 Set-top boxes
2. Advanced Encryption Standard (AES). :
AES based on the Rijindael algorithm, which was developed by Rijmen and Jone Daemen.
The features of AES are as follows −
 Symmetric key symmetric block cipher
 128-bit data, 128/192/256-bit keys
 Stronger and faster than Triple-DES
 Provide full specification and design details
 Software implementable in C and Java
Asymmetric Encrption
 Asymmetric Encryption consists of two cryptographic keys known as Public Key and
Private Key.
 Asymmetric Encryption (also known as asymmetric cryptography) allows users to
encrypt information using shared keys
 Diffie-Hellman
 ECC
Encrption Key Size:
 When deploying cipher ,it is important for user to decide on the size of the
crypto variable or key, because the strength of many encryption
applications and crypto system Is measured by key size.
 The length of the key increases the number of random guesses that have
to be made in order to break the code.
 Creating a larger universe of possibilities increase the time required to
make guesses, and thus a longer key directly influences the strength of
the encryption.
IS-cryptograpy algorithms.pptx

More Related Content

PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PPT
Elementry Cryptography
PDF
Computer Security (Cryptography) Ch01
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
PPT
Encryption
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PPTX
Seminar on Encryption and Authenticity
PPT
6. cryptography
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
Elementry Cryptography
Computer Security (Cryptography) Ch01
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Encryption
A Survey on Cryptographic Techniques for Network Security.pdf
Seminar on Encryption and Authenticity
6. cryptography

Similar to IS-cryptograpy algorithms.pptx (20)

PDF
N45028390
PDF
Cryptography Methodologies
PDF
Information Security 05- Encryption.pdfn
PDF
DES- Data Encryption Standard
PPTX
Chapter 5 - Enkripsi dan Kriptograpi.pptx
PPTX
Encryption in Cryptography
PPT
Cryptography Lecture by Sam Bowne
PDF
Email Encryption using Tri-Cryptosystem Based on Android
PDF
Basic Cryptography.pdf
PDF
Vtu network security(10 ec832) unit 2 notes..
PDF
UNIT 3 Information Security Sharad Institute
PPT
Ch12 Cryptography it-slideshares.blogspot.com
PDF
Analysis of Cryptographic Algorithms for Network Security
PDF
A Survey On The Cryptographic Encryption Algorithms
PPTX
Cryptography by Durlab Kumbhakar
PPTX
PPTX
Cryptography.pptx
PPT
Cryptography
PPTX
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
N45028390
Cryptography Methodologies
Information Security 05- Encryption.pdfn
DES- Data Encryption Standard
Chapter 5 - Enkripsi dan Kriptograpi.pptx
Encryption in Cryptography
Cryptography Lecture by Sam Bowne
Email Encryption using Tri-Cryptosystem Based on Android
Basic Cryptography.pdf
Vtu network security(10 ec832) unit 2 notes..
UNIT 3 Information Security Sharad Institute
Ch12 Cryptography it-slideshares.blogspot.com
Analysis of Cryptographic Algorithms for Network Security
A Survey On The Cryptographic Encryption Algorithms
Cryptography by Durlab Kumbhakar
Cryptography.pptx
Cryptography
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
Ad

More from V.V.Vanniaperumal College for Women (20)

PPTX
inheritance in Java with sample program.pptx
PPTX
System testing in software engineering.pptx
PPTX
static analysis and unit testing in SE.pptx
PPTX
software cost estimation techniques ppt.pptx
PPTX
Software cost factors in software engineering.pptx
PPTX
Planning the development Process in SE.pptx
PPTX
Quality and Productivity Factors in Software Engineering
PPTX
Some Size factors in software engineering
PPTX
PPTX
PPTX
Data_Transfer&Manupulation Instructions.pptx
PPTX
PPTX
PPTX
Instruction Codes.pptx
PPTX
PPTX
Constructors in JAva.pptx
PPTX
PPTX
IS-Delibrate software attacks.pptx
inheritance in Java with sample program.pptx
System testing in software engineering.pptx
static analysis and unit testing in SE.pptx
software cost estimation techniques ppt.pptx
Software cost factors in software engineering.pptx
Planning the development Process in SE.pptx
Quality and Productivity Factors in Software Engineering
Some Size factors in software engineering
Data_Transfer&Manupulation Instructions.pptx
Instruction Codes.pptx
Constructors in JAva.pptx
IS-Delibrate software attacks.pptx
Ad

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PDF
Business Ethics Teaching Materials for college
PDF
Complications of Minimal Access Surgery at WLH
PDF
Classroom Observation Tools for Teachers
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Basic Mud Logging Guide for educational purpose
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Cell Types and Its function , kingdom of life
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
STATICS OF THE RIGID BODIES Hibbelers.pdf
01-Introduction-to-Information-Management.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
Business Ethics Teaching Materials for college
Complications of Minimal Access Surgery at WLH
Classroom Observation Tools for Teachers
Renaissance Architecture: A Journey from Faith to Humanism
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Basic Mud Logging Guide for educational purpose
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Types and Its function , kingdom of life
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
VCE English Exam - Section C Student Revision Booklet
Abdominal Access Techniques with Prof. Dr. R K Mishra

IS-cryptograpy algorithms.pptx

  • 1. Cryptographic Algorithms Mrs.G.Chandraprabha.,M.Sc.,M.Phil., Assistant Professor Department of Information Technology, V.V.Vanniaperumal College for Women, Virudhunagar.
  • 2. Cryptograpy: The term is derived from the Greek word kryptos, which means hidden. Cryptographic Algorithms: Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures.
  • 3. Encryption & Decryption The process of converting plaintext into ciphertext.  The process of converting ciphertext into plaintext.
  • 4. Symmetric Encrption  Symmetric encryption is an encryption methodology that uses a single key to encrypt (encode) and decrypt (decode) data There are five main components :  plaintext  encryption algorithm  secret key  Cipher text  decryption algorithm
  • 5. Symmetric Encrption 1. Plaintext The term plaintext refers to the original message that's created and sent into the encryption method 2. Encryption Algorithm The encryption algorithm takes the plaintext and converts it into an unreadable format. 3. Key The key holds the information on all the switches and substitutions made to the original plain text. 4. Cipher text The cipher text is the text that is now scrambled and ready to be sent 5. Decryption Algorithm Basically performing the encryption in reverse.
  • 6. Two of the most common symmetric encryption 1. Data Encryption Standard (DES) :  The algorithm takes the plain text in 64-bit blocks and converts them into cipher text using 48- bit keys.  Smart cards  SIM cards  Modems  Routers  Set-top boxes
  • 7. 2. Advanced Encryption Standard (AES). : AES based on the Rijindael algorithm, which was developed by Rijmen and Jone Daemen. The features of AES are as follows −  Symmetric key symmetric block cipher  128-bit data, 128/192/256-bit keys  Stronger and faster than Triple-DES  Provide full specification and design details  Software implementable in C and Java
  • 8. Asymmetric Encrption  Asymmetric Encryption consists of two cryptographic keys known as Public Key and Private Key.  Asymmetric Encryption (also known as asymmetric cryptography) allows users to encrypt information using shared keys  Diffie-Hellman  ECC
  • 9. Encrption Key Size:  When deploying cipher ,it is important for user to decide on the size of the crypto variable or key, because the strength of many encryption applications and crypto system Is measured by key size.  The length of the key increases the number of random guesses that have to be made in order to break the code.  Creating a larger universe of possibilities increase the time required to make guesses, and thus a longer key directly influences the strength of the encryption.