SlideShare une entreprise Scribd logo
1  sur  20
What is cryptography?
Cryptography is the practice and study of techniques
for secure communication in the presence of third parties
(called adversaries).

More generally, it is about constructing and analyzing that
overcome the influence of adversaries and which are
related to various aspects in information security such as
data confidentiality, data integrity, and authentication.
HISTORY OF CRYPTOGRAPHY
THE ORIGIN OF CRYPTOGRAPHY TOOK PLCAE AROUND
 2000 B.C. IN EGYPT.
Before the modern era, cryptography was concerned solely with
message confidentiality (i.e., Encryption)—conversion of
messages from a comprehensible form into an incomprehensible
one and back again at the other end, rendering it unreadable by
interceptors or eavesdroppers without secret knowledge.

Encryption was used to ensure secrecy in communications,
such as those of spies, military leaders, and diplomats.
CLASSIC CRYPTOGRAPHY
 The main classical cipher types are transposition
ciphers, which rearrange the order of letters in a message and
substitution ciphers, which symmetrically replace letters with
other letters.

EXAMPLE., ‘hello world’ becomes 'ehlol owrdl' in a trivially
simple rearrangement scheme.



              A cipher (or cypher) is an algorithm for performing
              encryption or decryption — a series of well-defined
              steps that can be followed as a procedure.
An early substitution cipher was the Caesar cipher, in which each letter in
the plain text was replaced by a letter some fixed number of positions further
down the alphabet.

Suetonius reports that Julius Caesar used it with a shift of three to
communicate with his generals.




                   Reconstructed ancient Greek scytale
                   (rhymes with "Italy"), an early cipher device.
THE COMPUTER
     ERA

       OR

         MODERN
         CRYPTOGRAPHY
• The development of digital computers and electronics after WWII
  made possible much more complex ciphers. Furthermore, computers
  allowed for the encryption of any kind of data represent able in any
  binary format, unlike classical ciphers which only encrypted written
  language texts; this was new and significant.




                   German Lorenz cipher machine, used in World
                   War II to encrypt very-high-level general
                   staff messages.
•These days a fine example of cryptography is
Credit card with smart-card capabilities. The 3-by-5-mm chip
embedded in the card is shown, enlarged. Smart cards combine low cost
and portability with the power to compute cryptographic algorithms
Padlock icon from the Firefox Web
browser, meant to indicate a page has been sent
in SSL or TLS-encrypted protected form.
However, seeing an icon results when code is
intended to render it. Malicious code can provide
the icon even when the connection is not actually
being protected by SSL or TLS
This is a
CRYPTOGRAPHY
PIECE
The mod e r n f ie ld o f c rypt ogra phy c a n be
d ivid e d in t o s e ve r a l a r e a s o f s t u d y :


 SYMMETRIC KEY CRYPTOGRAPHY :
  Symmetric-key cryptography refers to encryption methods in
  which both the sender and receiver share the same key

 PUBLIC KEY CRYTOGRAPHY :
  Public key cryptography refers to encryption methods in which
  both the sender and receiver share the different keys.


              The basic elements of cryptography are:
              1. Encryption
              2. Decryption
              3. Key
The above example was of symmetric key cryptography.




           Here we can see the difference between PUBLIC and
           PRIVATE key
•The Data Encryption Standard (DES) and the Advanced
 Encryption Standard (AES) are block cipher designs which have
 been designated cryptography standards by the US government
 (though DES's designation was finally withdrawn after the AES was
 adopted).
PUBLIC KEY ENCRYPTION(Asymmetric key)
APPLICATIONS OF
CRYPTOGRAPHY
• ATM
• e-mail
• Secure remote access
• ISDN
• PEM
• PGD
• Smart Cards and many more
cryptography

Contenu connexe

Tendances

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 

Tendances (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similaire à cryptography

DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 

Similaire à cryptography (20)

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...Data Security on Computer Network and Telecommunication System Using Caesar C...
Data Security on Computer Network and Telecommunication System Using Caesar C...
 
Information Cryptography Security
Information Cryptography SecurityInformation Cryptography Security
Information Cryptography Security
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Week12
Week12Week12
Week12
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

cryptography

  • 1.
  • 2. What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, and authentication.
  • 3.
  • 4. HISTORY OF CRYPTOGRAPHY THE ORIGIN OF CRYPTOGRAPHY TOOK PLCAE AROUND 2000 B.C. IN EGYPT. Before the modern era, cryptography was concerned solely with message confidentiality (i.e., Encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge. Encryption was used to ensure secrecy in communications, such as those of spies, military leaders, and diplomats.
  • 5. CLASSIC CRYPTOGRAPHY The main classical cipher types are transposition ciphers, which rearrange the order of letters in a message and substitution ciphers, which symmetrically replace letters with other letters. EXAMPLE., ‘hello world’ becomes 'ehlol owrdl' in a trivially simple rearrangement scheme. A cipher (or cypher) is an algorithm for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure.
  • 6. An early substitution cipher was the Caesar cipher, in which each letter in the plain text was replaced by a letter some fixed number of positions further down the alphabet. Suetonius reports that Julius Caesar used it with a shift of three to communicate with his generals. Reconstructed ancient Greek scytale (rhymes with "Italy"), an early cipher device.
  • 7.
  • 8.
  • 9. THE COMPUTER ERA OR MODERN CRYPTOGRAPHY
  • 10. • The development of digital computers and electronics after WWII made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data represent able in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages.
  • 11. •These days a fine example of cryptography is Credit card with smart-card capabilities. The 3-by-5-mm chip embedded in the card is shown, enlarged. Smart cards combine low cost and portability with the power to compute cryptographic algorithms
  • 12. Padlock icon from the Firefox Web browser, meant to indicate a page has been sent in SSL or TLS-encrypted protected form. However, seeing an icon results when code is intended to render it. Malicious code can provide the icon even when the connection is not actually being protected by SSL or TLS
  • 14. The mod e r n f ie ld o f c rypt ogra phy c a n be d ivid e d in t o s e ve r a l a r e a s o f s t u d y : SYMMETRIC KEY CRYPTOGRAPHY : Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key PUBLIC KEY CRYTOGRAPHY : Public key cryptography refers to encryption methods in which both the sender and receiver share the different keys. The basic elements of cryptography are: 1. Encryption 2. Decryption 3. Key
  • 15.
  • 16. The above example was of symmetric key cryptography. Here we can see the difference between PUBLIC and PRIVATE key
  • 17. •The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted).
  • 19. APPLICATIONS OF CRYPTOGRAPHY • ATM • e-mail • Secure remote access • ISDN • PEM • PGD • Smart Cards and many more