SlideShare une entreprise Scribd logo
1  sur  15
Presented By:
Ms. Riddhi Gupta
BCA III Year
Dept. of Computer Science
Sophia Girls’ College
(Autonomous) Ajmer.
Presentation on
CRYPTOGRAPHY
Guided By:
Dr. Ritu Bhargava
Associate Professor
Dept. of Computer Science
Sophia Girls’ College
(Autonomous) Ajmer.
Learning OuTcome 2
 Introduction
 What is Cryptography?
 Purpose of Cryptography
 Architecture of Cryptography
 Types of Cryptography
 Process of cryptography
 Conclusion
 References
INTRODUCTION
 To secure network and data transmission via a wireless network,
cryptography, and network encryption is being used. Providing data
protection is one of the key aspects of wireless network data
transmission.
 The need for protection of the wireless network sensor is critical, and
encryption and network security are necessary. Network security
includes security for the terminal system as well as for the whole
network system.
 Network security is one of the main concerns as the world transitions
into the digital world. Security of the network provides security for
administrator-managed data. Increasing communication technology
also requires safe communication which is met through various
encryption techniques such as cryptography, digital signatures, and
other applications.
3
What is Cryptography?
Cryptography derived its name from a Greek word called
“krypto’s” which means “Hidden Secrets”.
Cryptography is the practice and study of hiding
information. It is the Art or Science of converting plain
intelligible data into unintelligible data and again
retransforming that message into its original form.
It provides Confidentiality, Integrity, and Accuracy.
Cryptography is a technique of encryption used to protect
the network, as various networks are related and admire
attacks and intrusions. Intrusion and computer protection
technologies are also used in attack forms.
4
5
PURPOSE OF CRYPTOGRAPHY
 Authentication
Privacy/confidentiality
Integrity
Non-repudiation
6
Cryptography supports several security aims to provide the privacy of information, non-
alteration of information, and so on. Because of the high-security benefit of cryptography, it
is broadly used today. There are various goals of cryptography which are as follows −
 Confidentiality − Information on the system is sent and has to be approached only
by the authorized party and not by anyone else. Confidentiality has been negotiated if
an unauthorized person can make a message. Confidentiality represents that sensitive
data should be restricted from being disclosed to unauthorized parties.
 Authentication − Authentication is any process by which it can test that someone is
whom they claim they are. This generally includes a username and a password but can
contain some other approach to demonstrating identities, such as a smart card, retina
scan, voice identification, or fingerprints. Authentication is the same as showing the
driver’s license at the ticket counter at the airport.
 Integrity − It can only the authorized party is enabled to change the transmitted
information. No one in between the sender and receiver is enabled to modify the given
message. One approach to providing integrity is to connect a definite indicator or
message digest at the end of the message that is active to be sent. If this digest
remains undamaged during transit then the principle has been canned.
 Non-repudiation - A mechanism to prove that the sender sent this message.
7
Architecture of cryptography
8
Types of Cryptography
Secret Key Cryptography
• Single key used to encrypt and decrypt.
• Key must be known by both parties.
• Assuming we live in a hostile environment (otherwise - why the
need for cryptography?), it may be hard to share a secret key.
9
Public Key Cryptography
One of the keys allocated to each person is called the "public
key" and is published in an open directory somewhere where
anyone can easily look it up, for example by email address.
Each entity has 2 keys:
 Private Key (a secret)
 Public key (well known).
10
Using Keys
 Private keys are used for decrypting.
 Public keys are used for encrypting.
11
Process of cryptography 12
CONCLUSION
 We use different types of algorithms to establish security
services in different service mechanisms.
We use either private key cryptography or public key
cryptography according to requirement.
 If we want to send a message quickly, we use the private key
algorithm; if we want to send messages secretly, we use the
public key algorithm.
13
References
www.researchgate.net
www.swayam.com
www.wikipedia.com
14
Thanks…!!!

Contenu connexe

Tendances

6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Tendances (20)

6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
Steganography Steganography
Steganography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 

Similaire à PRESENTATION ON CRYPTOGRAPHY.pptx

Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
KuntalSasmal1
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 

Similaire à PRESENTATION ON CRYPTOGRAPHY.pptx (20)

cryptography.ppt.ppt
cryptography.ppt.pptcryptography.ppt.ppt
cryptography.ppt.ppt
 
cryptography.ppt - Copy.ppt
cryptography.ppt - Copy.pptcryptography.ppt - Copy.ppt
cryptography.ppt - Copy.ppt
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
CRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptxCRYPTOGRAPHY & NETWORK SECURITY.pptx
CRYPTOGRAPHY & NETWORK SECURITY.pptx
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

PRESENTATION ON CRYPTOGRAPHY.pptx

  • 1. Presented By: Ms. Riddhi Gupta BCA III Year Dept. of Computer Science Sophia Girls’ College (Autonomous) Ajmer. Presentation on CRYPTOGRAPHY Guided By: Dr. Ritu Bhargava Associate Professor Dept. of Computer Science Sophia Girls’ College (Autonomous) Ajmer.
  • 2. Learning OuTcome 2  Introduction  What is Cryptography?  Purpose of Cryptography  Architecture of Cryptography  Types of Cryptography  Process of cryptography  Conclusion  References
  • 3. INTRODUCTION  To secure network and data transmission via a wireless network, cryptography, and network encryption is being used. Providing data protection is one of the key aspects of wireless network data transmission.  The need for protection of the wireless network sensor is critical, and encryption and network security are necessary. Network security includes security for the terminal system as well as for the whole network system.  Network security is one of the main concerns as the world transitions into the digital world. Security of the network provides security for administrator-managed data. Increasing communication technology also requires safe communication which is met through various encryption techniques such as cryptography, digital signatures, and other applications. 3
  • 4. What is Cryptography? Cryptography derived its name from a Greek word called “krypto’s” which means “Hidden Secrets”. Cryptography is the practice and study of hiding information. It is the Art or Science of converting plain intelligible data into unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, and Accuracy. Cryptography is a technique of encryption used to protect the network, as various networks are related and admire attacks and intrusions. Intrusion and computer protection technologies are also used in attack forms. 4
  • 5. 5
  • 6. PURPOSE OF CRYPTOGRAPHY  Authentication Privacy/confidentiality Integrity Non-repudiation 6
  • 7. Cryptography supports several security aims to provide the privacy of information, non- alteration of information, and so on. Because of the high-security benefit of cryptography, it is broadly used today. There are various goals of cryptography which are as follows −  Confidentiality − Information on the system is sent and has to be approached only by the authorized party and not by anyone else. Confidentiality has been negotiated if an unauthorized person can make a message. Confidentiality represents that sensitive data should be restricted from being disclosed to unauthorized parties.  Authentication − Authentication is any process by which it can test that someone is whom they claim they are. This generally includes a username and a password but can contain some other approach to demonstrating identities, such as a smart card, retina scan, voice identification, or fingerprints. Authentication is the same as showing the driver’s license at the ticket counter at the airport.  Integrity − It can only the authorized party is enabled to change the transmitted information. No one in between the sender and receiver is enabled to modify the given message. One approach to providing integrity is to connect a definite indicator or message digest at the end of the message that is active to be sent. If this digest remains undamaged during transit then the principle has been canned.  Non-repudiation - A mechanism to prove that the sender sent this message. 7
  • 9. Types of Cryptography Secret Key Cryptography • Single key used to encrypt and decrypt. • Key must be known by both parties. • Assuming we live in a hostile environment (otherwise - why the need for cryptography?), it may be hard to share a secret key. 9
  • 10. Public Key Cryptography One of the keys allocated to each person is called the "public key" and is published in an open directory somewhere where anyone can easily look it up, for example by email address. Each entity has 2 keys:  Private Key (a secret)  Public key (well known). 10
  • 11. Using Keys  Private keys are used for decrypting.  Public keys are used for encrypting. 11
  • 13. CONCLUSION  We use different types of algorithms to establish security services in different service mechanisms. We use either private key cryptography or public key cryptography according to requirement.  If we want to send a message quickly, we use the private key algorithm; if we want to send messages secretly, we use the public key algorithm. 13

Notes de l'éditeur

  1. 1