SlideShare a Scribd company logo
CRYPOGRAPHY
ENCRYPTION and
DECRYPTION
Some Basic Terms
 Plain Text/Clear Text :Data that can be read and
  understood without any special measure.
 Cipher Text :The unreadable plain text after
  encryption.
 Encryption :The method of disguising to hide its
  substance.
 Decryption :The method of reverting cipher text to
  its original plain text.
CRYPTANALYSIS vs. CRYPTOGRAPHY?
 Cryptography is a science of using mathematics to
  encrypt and decrypt data. It enable us to store and
  transmit sensitive data over unsecure network.
 Cryptanalysis is the science of analyzing and breaking
  secure communication.
CONVENTIONAL CRYPTOGRAPHY
 In conventional cryptography(symmetric key
  encryption)one key is used both for encryption and
  decryption.
 i.e. Caesar’s cipher
 This cryptography is very fast but is quite expensive
  due to difficulty of secure key distribution.
PUBLIC KEY CRYPTOGRAPHY
 It uses two key, one key for encryption(public key) and
  one for decryption(private key).
 We publish the data with the public key to the world
  while keeping the private key.
 The need for sender and receiver to share secret key
  via some secure channel is eliminated.
HYBRID CRYPTOGRAPHY
Combines strengths of both methods
Asymmetric distributes symmetric key.
 Also known as a session key(one time
 only secret key).
 Symmetric provides bulk encryption
i.e. PGP
KEYS
 Work with cryptographic algorithm to produce a
  specific cipher text.
 Larger keys are secure for longer period of time.
STEGANOGRAPHY
 Greek for “covered writing”


 “The art and science of writing hidden messages in
  such a way that no one apart from the intended
  recipient even knows that a message has been sent.”
 It makes use of seemingly innocent cover files such as
  text, audio, and image files
IMAGE BASED TECHNIQUE
 Least Significant Bit Insertion
 Replaces the LSB with the message to be encoded.
 Simple, but susceptible to lossy compression and
  image manipulation
 Masking and Filtering
 Masks secret data over the original data by changing
  the luminance of particular areas
 During masking, it embed the message within
  significant bits of the cover image
 Digital Watermarking – provides identification
 pertaining to the owner; i.e. license or copyright
 information
 - Invisible vs. Visible

 Fingerprinting – provides identification of the user;
 used to identify and track illegal use of content
WATERMARK
WEB HOSTING
 A web hosting is a type of Internet hosting that allows
 individuals and organizations to make their website
 accessible via the World Wide Web or locally in the
 network.

 The most basic is web page and small-scale file
 hosting, where files can be uploaded via File Transfer
 Protocol (FTP) on the server.
DNS
 A Domain Name Service translates queries for domain
 names (which are easier to understand and utilize
 when accessing the internet) into IP addresses for the
 purpose of locating computer services and devices
 worldwide.

 For example, the domain name
 www.ethicalpirates.com translates to the addresses
 172.16.32.254 (IPv4).
APACHE (Web Server)


 Web servers are computers that deliver (serves up)
 Web pages. Every Web server has an IP address and
 possibly a domain name.

 Any computer can be turned into a Web server by
 installing server software and connecting the machine
 to the internet
FIREWALL
 A firewall is a rule or set of rules create to permit or
  deny network transmissions based on a set of rules and
  is frequently used to protect networks from
  unauthorized access while permitting legitimate
  communications to pass.

 Firewalls are frequently used to prevent unauthorized
  Internet users from accessing private networks
  connected to the Internet, especially intranets.
 i.e. Packet Filter, Proxy Server etc.
REFERENCES
 www.jjtc.com/stegdoc/steg1995.html
 “Information Hiding: Techniques for Steganography
  and Digital Watermarking” – S. Katzenbeisser, F. Petit
  colas
 “RSA Security’s Official Guide to Cryptography” by S.
  Burnett and S. Paine, Osborne/McGraw-Hill, 2001
 The Code Breaker-David Khan

More Related Content

PDF
How encryption works
PDF
Week13
PDF
PDF
Sw week12
PDF
Week13presen
PDF
Sp W12
PDF
Week 12 slide
PDF
Kadai1
How encryption works
Week13
Sw week12
Week13presen
Sp W12
Week 12 slide
Kadai1

What's hot (16)

PDF
Week13
PDF
How encryption works
PPTX
Enhancing lan using cryptography and other modules
PDF
$ii7oi5i-12
PDF
s117
PDF
Week13
PPTX
Cryptography
PDF
Week13
PDF
Week11
PPT
Securityand encryption
PPTX
Steganography
PPT
A+ Update Endpoint Encryption
ODP
Week13
PPT
Encryption Primer por Cathy Nolan
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
PDF
Privacy preserving ciphertext multi-sharing control for big data storage
Week13
How encryption works
Enhancing lan using cryptography and other modules
$ii7oi5i-12
s117
Week13
Cryptography
Week13
Week11
Securityand encryption
Steganography
A+ Update Endpoint Encryption
Week13
Encryption Primer por Cathy Nolan
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
Ad

Viewers also liked (20)

PPT
Introduction image processing
PPT
02 psychovisual perception DIP
PPT
04 image enhancement in spatial domain DIP
PDF
Network programming Using Python
PPT
07 frequency domain DIP
PPT
Image processing spatialfiltering
PPT
01 introduction DIP
DOCX
applist
PPT
Digitized images and
PPT
6 spatial filtering p2
PPT
5 spatial filtering p1
PPTX
Mathematical operations in image processing
PPT
Module 5 Sniffers
PPT
Image pre processing-restoration
PPT
06 spatial filtering DIP
PPT
Enhancement in frequency domain
PPT
05 histogram processing DIP
PPT
08 frequency domain filtering DIP
PPT
10 color image processing
PPTX
Image enhancement
Introduction image processing
02 psychovisual perception DIP
04 image enhancement in spatial domain DIP
Network programming Using Python
07 frequency domain DIP
Image processing spatialfiltering
01 introduction DIP
applist
Digitized images and
6 spatial filtering p2
5 spatial filtering p1
Mathematical operations in image processing
Module 5 Sniffers
Image pre processing-restoration
06 spatial filtering DIP
Enhancement in frequency domain
05 histogram processing DIP
08 frequency domain filtering DIP
10 color image processing
Image enhancement
Ad

Similar to online game over cryptography (20)

PPT
Cyber security Unit 3 Cryptography and Network security
PPTX
Cryptography
DOCX
Chapter 8Secure Transport LayerIn the early days of th
PPTX
Overview of cryptography
PPT
Chapter 08
PPTX
ENCRYPTION.pptx
PPTX
Presentation on Cyber Security
PPTX
Iot Security
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
Week 12 slide
PDF
Group slide presentation week12
PPT
Info security & crypto
DOC
Social Engg. Assignment it17 final (1)
PPTX
fundamental of network security
PDF
cryptography
PDF
Frsa
PPTX
Network security
PPTX
Introduction-to-Cryptography-in-IoT.pptx
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
PPTX
Cryptography
Cyber security Unit 3 Cryptography and Network security
Cryptography
Chapter 8Secure Transport LayerIn the early days of th
Overview of cryptography
Chapter 08
ENCRYPTION.pptx
Presentation on Cyber Security
Iot Security
International Refereed Journal of Engineering and Science (IRJES)
Week 12 slide
Group slide presentation week12
Info security & crypto
Social Engg. Assignment it17 final (1)
fundamental of network security
cryptography
Frsa
Network security
Introduction-to-Cryptography-in-IoT.pptx
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cryptography

More from Ashish Kumar (20)

PPT
Computer architecture
PPT
Lecture2 color
PPT
Introduction vision
PPT
Introduction image processing
PPT
Image pre processing
PPT
Image pre processing - local processing
PPT
Enhancement in spatial domain
PPT
Data structures
PPT
Lecture2 light
PPT
process management
PPT
resource management
PPT
distributed shared memory
PPT
message passing
PPT
remote procedure calls
PPT
PPT
system design
PPTX
video compression techique
PPT
Compression
PPTX
1.animation
PPTX
Computer architecture
Lecture2 color
Introduction vision
Introduction image processing
Image pre processing
Image pre processing - local processing
Enhancement in spatial domain
Data structures
Lecture2 light
process management
resource management
distributed shared memory
message passing
remote procedure calls
system design
video compression techique
Compression
1.animation

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
RMMM.pdf make it easy to upload and study
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Complications of Minimal Access Surgery at WLH
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
O7-L3 Supply Chain Operations - ICLT Program
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Cell Types and Its function , kingdom of life
TR - Agricultural Crops Production NC III.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Pharma ospi slides which help in ospi learning
Renaissance Architecture: A Journey from Faith to Humanism
RMMM.pdf make it easy to upload and study
Microbial disease of the cardiovascular and lymphatic systems
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Week 4 Term 3 Study Techniques revisited.pptx

online game over cryptography

  • 3. Some Basic Terms  Plain Text/Clear Text :Data that can be read and understood without any special measure.  Cipher Text :The unreadable plain text after encryption.  Encryption :The method of disguising to hide its substance.  Decryption :The method of reverting cipher text to its original plain text.
  • 4. CRYPTANALYSIS vs. CRYPTOGRAPHY?  Cryptography is a science of using mathematics to encrypt and decrypt data. It enable us to store and transmit sensitive data over unsecure network.  Cryptanalysis is the science of analyzing and breaking secure communication.
  • 6.  In conventional cryptography(symmetric key encryption)one key is used both for encryption and decryption.  i.e. Caesar’s cipher  This cryptography is very fast but is quite expensive due to difficulty of secure key distribution.
  • 8.  It uses two key, one key for encryption(public key) and one for decryption(private key).  We publish the data with the public key to the world while keeping the private key.  The need for sender and receiver to share secret key via some secure channel is eliminated.
  • 10. Combines strengths of both methods Asymmetric distributes symmetric key.  Also known as a session key(one time only secret key).  Symmetric provides bulk encryption i.e. PGP
  • 11. KEYS  Work with cryptographic algorithm to produce a specific cipher text.  Larger keys are secure for longer period of time.
  • 12. STEGANOGRAPHY  Greek for “covered writing”  “The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  It makes use of seemingly innocent cover files such as text, audio, and image files
  • 13. IMAGE BASED TECHNIQUE  Least Significant Bit Insertion  Replaces the LSB with the message to be encoded.  Simple, but susceptible to lossy compression and image manipulation  Masking and Filtering  Masks secret data over the original data by changing the luminance of particular areas  During masking, it embed the message within significant bits of the cover image
  • 14.  Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs. Visible  Fingerprinting – provides identification of the user; used to identify and track illegal use of content
  • 17.  A web hosting is a type of Internet hosting that allows individuals and organizations to make their website accessible via the World Wide Web or locally in the network.  The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) on the server.
  • 18. DNS  A Domain Name Service translates queries for domain names (which are easier to understand and utilize when accessing the internet) into IP addresses for the purpose of locating computer services and devices worldwide.  For example, the domain name www.ethicalpirates.com translates to the addresses 172.16.32.254 (IPv4).
  • 19. APACHE (Web Server)  Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name.  Any computer can be turned into a Web server by installing server software and connecting the machine to the internet
  • 21.  A firewall is a rule or set of rules create to permit or deny network transmissions based on a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.  Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.  i.e. Packet Filter, Proxy Server etc.
  • 22. REFERENCES  www.jjtc.com/stegdoc/steg1995.html  “Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petit colas  “RSA Security’s Official Guide to Cryptography” by S. Burnett and S. Paine, Osborne/McGraw-Hill, 2001  The Code Breaker-David Khan