SlideShare a Scribd company logo
1 of 35
CRYPTOGRAPHY
SANDHIYA
S
RANJTHA
B
CRYPTOGRAPHIC TERMINOLOGY
• PLAIN TEXT: The format of the data before
encrypted.
• CIPHER TEXT: The scrambled format of data
after being encrypted.
• ENCRYPTION: Method of transforming plain
text into an unreadable format.
• DECRYPTION: Method of obtaining the
encrypted text into plain text.
What is Cryptography
The art of protecting information by
transforming it (Encrypting it) into an
unreadable format, called Cipher text, only
those who posses a secret key can
Decipher or (Decrypt) the message into
Plain text.
WHY WE NEED A
CRYPTOGRAGHY
• For confidentiality
• For authentication
• For data integrity
SYMMETRIC KEY ENCRYPTION
TYPES OF SYMMETRIC
ENCRYPTION
oSUBSTITUTION
CIPHER
oTRANSPOSTION
CIPER
A- 0
B- 1
C- 2
D- 3
E- 4
F- 5
G- 6
H- 7
I- 8
J- 9
K- 10
L- 11
M-12
N- 13
O- 14
P- 15
Q- 16
R- 17
S- 18
T- 19
U- 20
V- 21
W-22
X- 23
Y- 24
Z- 25
PUBLIC /PRIVATE KEY
• A public key known to everyone
• private or secret key known only to the
recipient of the message
• When John wants to send a secure
message to Jane, he uses Jane's public
key to encrypt the message. Jane then
uses her private key to decrypt it.
ASYMMETRIC KEY ENCRYPTION
TYPES OF ASYMMETRIC ALGORITHMS
DIFFIE-HELLMAN
RSA
EI GAMAL
ELLIPTIC CURVE CRYPTOGRAPHY(ECC)
DIFFIE-HELLMAN METHOD
Alice and Bob were communicating each
other via mail
Eve trying to hack the message
To avoid hacking they are using
DIFFIE-HELLMAN METHOD
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
alice Bob
Eve
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
Alice Bob
Eve
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Eve
Alice Bob
Eve
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
3xmod 17
3xmod 17
3xmod 17
EXAPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
3xmod 17
3xmod 17
3xmod 17
Random Number=15
Random Number=13
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
3xmod 17
3xmod 17
3xmod 17
Random Number=15
Random Number=13
315 mod 17=6
313mod 17=12
Alice Bob
Eve
3xmod 17
3xmod 17
3xmod 17
Random Number=15
Random Number=13
315 mod 17=6 12 = 313mod 17
6
6
12
12
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
3xmod 17
3xmod 17
3xmod 17
Random Number=15
Random Number=13
315 mod 17=6 12 = 313mod 17
6
6
12
12
1215mod 17=10 613mod17=10
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Alice Bob
Eve
3xmod 17
3xmod 17
3xmod 17
Random Number=15
Random Number=13
315 mod 17=6 12 = 313mod 17
6
6
12
12
1215mod 17=10 613mod17=10
36mod17=15
312mod17=4
EXAMPLE FOR DIFFIE-HELLMAN
METHOD
Cryptography.
Cryptography.
Cryptography.
Cryptography.

More Related Content

Similar to Cryptography.

Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
Maryam522887
 

Similar to Cryptography. (20)

Crypt
CryptCrypt
Crypt
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network Security
 
Fundamentals of cryptography workshop
Fundamentals of cryptography workshopFundamentals of cryptography workshop
Fundamentals of cryptography workshop
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Is case study
Is   case studyIs   case study
Is case study
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Unit – III.pptx
Unit – III.pptxUnit – III.pptx
Unit – III.pptx
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Crypt
CryptCrypt
Crypt
 
Basic Cryptography Overview
Basic Cryptography OverviewBasic Cryptography Overview
Basic Cryptography Overview
 
Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Cryptography by gaurav singh
Cryptography by gaurav singhCryptography by gaurav singh
Cryptography by gaurav singh
 
Chapter# 3 modified.pptx
Chapter# 3 modified.pptxChapter# 3 modified.pptx
Chapter# 3 modified.pptx
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCL
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Cryptography.