SlideShare une entreprise Scribd logo
1  sur  21
BY: VAISHNAVI KHANDELWAL
BC2018058
SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION &
DECRYPTION
CATEGORIES OF
CYRPTOGRAPHY
COMPARISON
CONCLUSION
SECURITY?
??
CONFIDENTIALITY INTEGRITY
SECURE
NON-REPUDIATION
• Cryptography
science and
is the
art of
transforming messages
to make them secure
and immune to attack.
PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION &
DECRYPTION
KEYS
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAPHY
• Also known as secret key. Sender &
receiver uses same key & an
encryption/decryption algorithm to
encrypt/decrypt data. i.e. the key is
shared.
ENCRYPTION DECRYPTION
CIPHERTEX
T
SENDER
RECEIVER
SECRET KEY
TRADITIONAL
CIPHERS
SUBSTITUTION
CIPHER
TRANSPOSITION
CIPHER
A substitution technique is one in which the
letters/number/symbols of plaintext are
replaced by other letters/numbers/symbols.
e.g. A D,
T 2 5, 3
Z
6
In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with
one another.
Plain text: MEET ME AFTER
PARTY
Cipher text:
TEMEEMEFAPTRYRAT
KEY USED: 421635
1 2 3 4 5 6
M E E T M E
A F T E R P
A R T Y
4 2 1 6 3 5
T E M E E M
E F A P T R
Y R A T
Also known as public key cryptography.
Sender & receiver uses different keys
for encryption & decryption namely
PUBLIC & PRIVATE respectively.
ENCRYPTION DECRYPTION
CIPHERTEX
T
SENDER RECEIVER
PUBLIC
KEY
PRIVATE
KEY
SYMMETRIC KEY
CRYPTOGRAPHY
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY
CRYPTOGRAPHY
1) The same algorithm with the same
key is used for encryption and
decryption.
2) The key must be kept secret.
3)It may be impossible or at least
impractical to decipher a message if no
other information is available.
1)One algorithm is used for encryption
and decryption with a pair of keys, one
for encryption and one for decryption.
2)One of the two keys must be kept
secret.
3)It may be impossible or at least
impractical to decipher a message if no
other information is available.
Defense services
Secure data
manipulation
E –commerce
Business transactions
Internet payment
systems
User identification
systems
Access control
Data security
By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access
control and availability of data is maintained.
Cryptography ppt by vaishnavi khandelwal

Contenu connexe

Tendances

Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan
 

Tendances (20)

Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTCryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Crytography
CrytographyCrytography
Crytography
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 

Similaire à Cryptography ppt by vaishnavi khandelwal

PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 

Similaire à Cryptography ppt by vaishnavi khandelwal (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Ccn
CcnCcn
Ccn
 
Ccn
CcnCcn
Ccn
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
Encryption Encryption
Encryption
 
cryptography and network security
cryptography and network security cryptography and network security
cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 

Plus de VaishnaviKhandelwal6

Plus de VaishnaviKhandelwal6 (15)

Presentation on li fi by vaishnavi khandelwal
Presentation on li fi by vaishnavi khandelwalPresentation on li fi by vaishnavi khandelwal
Presentation on li fi by vaishnavi khandelwal
 
Od intervention ppt by vaishnavi khandelwal
Od intervention ppt by vaishnavi khandelwalOd intervention ppt by vaishnavi khandelwal
Od intervention ppt by vaishnavi khandelwal
 
Various organisation structure ppt by vaishnavi khandelwal
Various organisation structure ppt by vaishnavi khandelwal Various organisation structure ppt by vaishnavi khandelwal
Various organisation structure ppt by vaishnavi khandelwal
 
Organizational design ppt by vaishnavi khandelwal
Organizational design ppt by vaishnavi khandelwal Organizational design ppt by vaishnavi khandelwal
Organizational design ppt by vaishnavi khandelwal
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Intel mmx technology ppt by vaishnavi khandelwal
Intel mmx technology ppt by vaishnavi khandelwal Intel mmx technology ppt by vaishnavi khandelwal
Intel mmx technology ppt by vaishnavi khandelwal
 
Attitude
AttitudeAttitude
Attitude
 
Machine translation ppt by shantanu arora
Machine translation ppt by shantanu aroraMachine translation ppt by shantanu arora
Machine translation ppt by shantanu arora
 
Theories of leadership and styles ppt by shantanu arora
Theories of leadership and styles ppt by shantanu aroraTheories of leadership and styles ppt by shantanu arora
Theories of leadership and styles ppt by shantanu arora
 
Various organisation structure ppt by vaishnavi khandelwal
Various organisation structure ppt by vaishnavi khandelwalVarious organisation structure ppt by vaishnavi khandelwal
Various organisation structure ppt by vaishnavi khandelwal
 
Final presentation on chatbot
Final presentation on chatbotFinal presentation on chatbot
Final presentation on chatbot
 
Devops ppt by shantanu arora
Devops ppt by shantanu aroraDevops ppt by shantanu arora
Devops ppt by shantanu arora
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Group dynamics ppt by shantanu arora
Group dynamics ppt by shantanu aroraGroup dynamics ppt by shantanu arora
Group dynamics ppt by shantanu arora
 
Group cohensiveness ppt by shantanu arora
Group cohensiveness ppt by shantanu aroraGroup cohensiveness ppt by shantanu arora
Group cohensiveness ppt by shantanu arora
 

Dernier

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Dernier (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 

Cryptography ppt by vaishnavi khandelwal