SlideShare a Scribd company logo
1 of 26
Introduction to
Cryptography
-Afif
Contents
• Introduction
• History
• Terminology
• Cryptography Methods
• Difference between Methods
• Application
Introduction
Cryptography:
Cryptography is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and
process it. Cryptography is closely related to the disciplines
of cryptology and cryptanalysis. Cryptography includes techniques such
as microdots, merging words with images, and other ways to hide
information in storage or transit.
German Lorenz cipher machine, used in World War II to
encrypt very-high-level general staff messages.
History
BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing
and Notable Roman ciphers such as the Caesar cipher.
1-1799: Leon Battista Alberti invents polyalphabetic cipher, also known
first mechanical cipher machine.
1800-1899: Joseph Henry builds an electric. In Crimean War, Charles
Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of
the time).
1900-1949: First break of German Army Enigma by Marian Rejewski in
Poland.
1950-1999: Charles Bennett and Gilles Brassard design the
first quantum cryptography protocol, BB84.
2000 to present: Microsoft and its allies vow to end "full
disclosure" of security vulnerabilities by replacing it
with "responsible" disclosure guidelines.
Classic cryptography
The Greek’s idea on cryptography was to
wrap a tape around a stick, and then
write the message on the wound tape.
When the tape was unwound, the
writing would be meaningless. The
receiver of the message would of course
have a stick of the same diameter and
use it to decipher the message.
Reconstructed ancient Greek
scytale, an early cipher device.
Computer era
Cryptanalysis of the new mechanical devices
proved to be both difficult and laborious. Just as
the development of digital computers and
electronics helped in cryptanalysis, it made
possible much more complex ciphers.
Furthermore, computers allowed for the
encryption of any kind of data representable in
any binary format, unlike classical ciphers which
only encrypted written language texts.
An example of simple cryptography
Terminology
Plaintext:
Message that is going to be transmitted or stored is plain text. Anyone
can read plaintext.
Encryption:
The method by which we can hide the actual meaning of plaintext is
called Encryption.
Cipher text:
The result of encryption which results in unreadable gibberish is called
Cipher text.
Decryption:
The method by which the original meaning of cipher text can be
recovered is called Decryption. Simply the process of converting Cipher
text to plaintext is called Decryption.
Key:
Key is the secret piece of information which is used for encryption and
decryption in Cryptography.
Method of Encryption and Decryption
 Some more terms:
Cryptanalysis:
The science of retrieving the plain text from cipher without knowing
the key.
Cryptanalysts:
The people who practice cryptanalysis are called Cryptanalyst.
Cryptosystem:
The combination of algorithm, key, and key management functions
used to perform cryptographic operations.
 Caesar Cipher
The Caesar cipher, also known as a shift cipher, is one of the simplest
forms of encryption. It is a substitution cipher where each letter in the
original message (called the plaintext) is replaced with a letter
corresponding to a certain number of letters up or down in the
alphabet.
Caesar Cipher with shifting value ‘3’
We love
Discrete
Mathematics
Zh oryh
Glvfuhwh
Pdwkhpdwlfv
We love
Discrete
Mathematics
Right shift
of
3
Left shift
of
3
Plaintext Cipher Plaintext
Cryptography Methods
Symmetric Key:
With Symmetric key Cryptography, a single key is used for both
encryption and decryption. In this figure we can see that the sender
uses the key to encrypt the plain text and send the cipher text to the
receiver. The receiver applies the same key to decrypt the message and
recover the plain text because a single key is used for both function.
Symmetric key Cryptography is also called secret key Cryptography.
With this from of Cryptography, it is obvious that the key must be
known to both the sender and the receiver.
Visualization of Symmetric key Cryptography
Asymmetric Key:
Asymmetric cryptography was first publicly described by martin
Hellman and his student Whitfield Diffie in 1976. There are two
different keys are used for encryption and decryption. One key is used
to encrypt the plaintext and the other key is used to decrypt the cipher
text the important point is that it doesn’t matter which key is applied
first but the both key is required for the work. Every user has both a
public key and a private key. The private key is kept secret at all times,
but the public key may be freely distributed.
Visualization of Asymmetric key Cryptography
Difference between Methods
Symmetric Cryptography
Examples of encryption:
DES, 3DES, AES and RC4.
Asymmetric Cryptography
Examples of encryption:
The most common asymmetric encryption
algorithm is RSA
Applications
1. ATM
2. Email-Passwords
3. E-Payment
4. E-Commerce
5. Electronic Voting
6. Defence Services
7. Securing Data
8. Access Control
Thank You!

More Related Content

What's hot

Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applicationsthai
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptographychauhankapil
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 

What's hot (20)

Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 

Viewers also liked

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyPopescu Petre
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography PresentationDonte Francis
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographyAmir Neziri
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risksosuhaibany
 
Building Social Networks
Building Social NetworksBuilding Social Networks
Building Social Networksnyccamp
 
Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Matt Charney
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part IMaksim Djackov
 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security
Network securityNetwork security
Network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Rsa
RsaRsa
Rsa
 
Steganography
SteganographySteganography
Steganography
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
Building Social Networks
Building Social NetworksBuilding Social Networks
Building Social Networks
 
Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.Data Visualization and Social Network Analysis for Recruiting.
Data Visualization and Social Network Analysis for Recruiting.
 
Introduction to Cryptography Part I
Introduction to Cryptography Part IIntroduction to Cryptography Part I
Introduction to Cryptography Part I
 

Similar to Introduction to Cryptography

Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writingtahirilyas92
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Cryptography
CryptographyCryptography
Cryptographyherrberk
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405ukd789555
 
Cryptography
CryptographyCryptography
CryptographyAskme.com
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptxsunil sharma
 

Similar to Introduction to Cryptography (20)

Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Pavan
PavanPavan
Pavan
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405crypto-105058445051058480051448005540405
crypto-105058445051058480051448005540405
 
Cryptography
CryptographyCryptography
Cryptography
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 

More from Md. Afif Al Mamun

More from Md. Afif Al Mamun (10)

Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Relational Algebra Introduction
Relational Algebra IntroductionRelational Algebra Introduction
Relational Algebra Introduction
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
Introduction to Software
Introduction to SoftwareIntroduction to Software
Introduction to Software
 
Parallel Circuits
Parallel CircuitsParallel Circuits
Parallel Circuits
 
Linked list
Linked listLinked list
Linked list
 
Presentation on pointer.
Presentation on pointer.Presentation on pointer.
Presentation on pointer.
 
Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.Mechanism of a Microwave Oven.
Mechanism of a Microwave Oven.
 
George Harrison
George HarrisonGeorge Harrison
George Harrison
 
Artificial Intelligence(AI).
Artificial Intelligence(AI).Artificial Intelligence(AI).
Artificial Intelligence(AI).
 

Recently uploaded

Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfSumit Kumar yadav
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.Silpa
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...Monika Rani
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxSilpa
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptxCyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptxSilpa
 
Role of AI in seed science Predictive modelling and Beyond.pptx
Role of AI in seed science  Predictive modelling and  Beyond.pptxRole of AI in seed science  Predictive modelling and  Beyond.pptx
Role of AI in seed science Predictive modelling and Beyond.pptxArvind Kumar
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Serviceshivanisharma5244
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Silpa
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptxSilpa
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....muralinath2
 
Atp synthase , Atp synthase complex 1 to 4.
Atp synthase , Atp synthase complex 1 to 4.Atp synthase , Atp synthase complex 1 to 4.
Atp synthase , Atp synthase complex 1 to 4.Silpa
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsOrtegaSyrineMay
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxDiariAli
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxSuji236384
 
Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Silpa
 

Recently uploaded (20)

Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
Genome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptxGenome sequencing,shotgun sequencing.pptx
Genome sequencing,shotgun sequencing.pptx
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptxCyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptx
 
Role of AI in seed science Predictive modelling and Beyond.pptx
Role of AI in seed science  Predictive modelling and  Beyond.pptxRole of AI in seed science  Predictive modelling and  Beyond.pptx
Role of AI in seed science Predictive modelling and Beyond.pptx
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICEPATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
Atp synthase , Atp synthase complex 1 to 4.
Atp synthase , Atp synthase complex 1 to 4.Atp synthase , Atp synthase complex 1 to 4.
Atp synthase , Atp synthase complex 1 to 4.
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.
 

Introduction to Cryptography

  • 2. Contents • Introduction • History • Terminology • Cryptography Methods • Difference between Methods • Application
  • 3. Introduction Cryptography: Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.
  • 4. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages.
  • 5. History BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing and Notable Roman ciphers such as the Caesar cipher. 1-1799: Leon Battista Alberti invents polyalphabetic cipher, also known first mechanical cipher machine. 1800-1899: Joseph Henry builds an electric. In Crimean War, Charles Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of the time).
  • 6. 1900-1949: First break of German Army Enigma by Marian Rejewski in Poland. 1950-1999: Charles Bennett and Gilles Brassard design the first quantum cryptography protocol, BB84. 2000 to present: Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
  • 7. Classic cryptography The Greek’s idea on cryptography was to wrap a tape around a stick, and then write the message on the wound tape. When the tape was unwound, the writing would be meaningless. The receiver of the message would of course have a stick of the same diameter and use it to decipher the message. Reconstructed ancient Greek scytale, an early cipher device.
  • 8. Computer era Cryptanalysis of the new mechanical devices proved to be both difficult and laborious. Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts. An example of simple cryptography
  • 9. Terminology Plaintext: Message that is going to be transmitted or stored is plain text. Anyone can read plaintext. Encryption: The method by which we can hide the actual meaning of plaintext is called Encryption.
  • 10. Cipher text: The result of encryption which results in unreadable gibberish is called Cipher text. Decryption: The method by which the original meaning of cipher text can be recovered is called Decryption. Simply the process of converting Cipher text to plaintext is called Decryption.
  • 11. Key: Key is the secret piece of information which is used for encryption and decryption in Cryptography.
  • 12. Method of Encryption and Decryption
  • 13.  Some more terms: Cryptanalysis: The science of retrieving the plain text from cipher without knowing the key. Cryptanalysts: The people who practice cryptanalysis are called Cryptanalyst.
  • 14. Cryptosystem: The combination of algorithm, key, and key management functions used to perform cryptographic operations.
  • 15.  Caesar Cipher The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet.
  • 16. Caesar Cipher with shifting value ‘3’
  • 17. We love Discrete Mathematics Zh oryh Glvfuhwh Pdwkhpdwlfv We love Discrete Mathematics Right shift of 3 Left shift of 3 Plaintext Cipher Plaintext
  • 18. Cryptography Methods Symmetric Key: With Symmetric key Cryptography, a single key is used for both encryption and decryption. In this figure we can see that the sender uses the key to encrypt the plain text and send the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plain text because a single key is used for both function. Symmetric key Cryptography is also called secret key Cryptography. With this from of Cryptography, it is obvious that the key must be known to both the sender and the receiver.
  • 19. Visualization of Symmetric key Cryptography
  • 20. Asymmetric Key: Asymmetric cryptography was first publicly described by martin Hellman and his student Whitfield Diffie in 1976. There are two different keys are used for encryption and decryption. One key is used to encrypt the plaintext and the other key is used to decrypt the cipher text the important point is that it doesn’t matter which key is applied first but the both key is required for the work. Every user has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.
  • 21. Visualization of Asymmetric key Cryptography
  • 23. Symmetric Cryptography Examples of encryption: DES, 3DES, AES and RC4.
  • 24. Asymmetric Cryptography Examples of encryption: The most common asymmetric encryption algorithm is RSA
  • 25. Applications 1. ATM 2. Email-Passwords 3. E-Payment 4. E-Commerce 5. Electronic Voting 6. Defence Services 7. Securing Data 8. Access Control