Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
KUSUM SHARMA
M.Sc S/W
 SECURITY
 SECURITY THREATS
 SECURITY GOALS
 WHAT IS CRYPTOGRAPHY
 BASIC TERMS
 ENCRYPTION & DECRYPTION
 CATEGORIES...
SECURITY???
CONFIDENTIALITY INTEGRITY
SECURE
NON-REPUDIATION
• Cryptography is the
science and art of
transforming messages
to make them secure
and immune to attack.
 PLAIN TEXT
 CIPHER TEXT
 CIPHER
 ENCRYPTION & DECRYPTION
 KEYS
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC KEY
CRYPTOGRAPHY
• Also known as secret key. Sender & receiver
uses same key & an encryption/decryption
algorithm to encrypt/decrypt data. ...
ENCRYPTION DECRYPTION
CIPHERTEXT
SENDER RECEIVER
SECRET KEY
TRADITIONAL
CIPHERS
SUBSTITUTION
CIPHER
TRANSPOSITION
CIPHER
 A substitution technique is one in which the
letters/number/symbols of plaintext are
replaced by other letters/numbers/s...
 In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with one
another.
 Plai...
 Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC &...
ENCRYPTION DECRYPTION
CIPHERTEXT
SENDER RECEIVER
PUBLIC KEY PRIVATE KEY
SYMMETRIC KEY
CRYPTOGRAPHY
ASYMMETRIC KEY
CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1) The same algorithm with the same
key is used for encryption and
...
 Defense services
 Secure data manipulation
 E –commerce
 Business transactions
 Internet payment systems
 User iden...
 By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access control
and availabi...
Cryptography.ppt
Cryptography.ppt
Cryptography.ppt
Prochain SlideShare
Chargement dans…5
×

Cryptography.ppt

173 597 vues

Publié le

Cryptography ppt

Publié dans : Technologie, Formation
  • These are one of the best companies for review articles. High quality with cheap rates. ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐ I highly recommend it :)
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐ has really great writers to help you get the grades you need, they are fast and do great research. Support will always contact you if there is any confusion with the requirements of your paper so they can make sure you are getting exactly what you need.
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • I’ve personally never heard of companies who can produce a paper for you until word got around among my college groupmates. My professor asked me to write a research paper based on a field I have no idea about. My research skills are also very poor. So, I thought I’d give it a try. I chose a writer who matched my writing style and fulfilled every requirement I proposed. I turned my paper in and I actually got a good grade. I highly recommend ⇒ www.WritePaper.info ⇐
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • ⇒ www.WritePaper.info ⇐ is a good website if you’re looking to get your essay written for you. You can also request things like research papers or dissertations. It’s really convenient and helpful.
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • If we are speaking about saving time and money this site ⇒ www.HelpWriting.net ⇐ is going to be the best option!! I personally used lots of times and remain highly satisfied.
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

Cryptography.ppt

  1. 1. KUSUM SHARMA M.Sc S/W
  2. 2.  SECURITY  SECURITY THREATS  SECURITY GOALS  WHAT IS CRYPTOGRAPHY  BASIC TERMS  ENCRYPTION & DECRYPTION  CATEGORIES OF CYRPTOGRAPHY  COMPARISON  CONCLUSION
  3. 3. SECURITY???
  4. 4. CONFIDENTIALITY INTEGRITY SECURE NON-REPUDIATION
  5. 5. • Cryptography is the science and art of transforming messages to make them secure and immune to attack.
  6. 6.  PLAIN TEXT  CIPHER TEXT  CIPHER  ENCRYPTION & DECRYPTION  KEYS
  7. 7. ASYMMETRIC KEY CRYPTOGRAPHY SYMMETRIC KEY CRYPTOGRAPHY
  8. 8. • Also known as secret key. Sender & receiver uses same key & an encryption/decryption algorithm to encrypt/decrypt data. i.e. the key is shared.
  9. 9. ENCRYPTION DECRYPTION CIPHERTEXT SENDER RECEIVER SECRET KEY
  10. 10. TRADITIONAL CIPHERS SUBSTITUTION CIPHER TRANSPOSITION CIPHER
  11. 11.  A substitution technique is one in which the letters/number/symbols of plaintext are replaced by other letters/numbers/symbols. e.g. A D, T Z 2 5, 3 6
  12. 12.  In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another.  Plain text: MEET ME AFTER PARTY  Cipher text: TEMEEMEFAPTRYRAT  KEY USED: 421635 1 2 3 4 5 6 M E E T M E A F T E R P A R T Y 4 2 1 6 3 5 T E M E E M E F A P T R Y R A T
  13. 13.  Also known as public key cryptography. Sender & receiver uses different keys for encryption & decryption namely PUBLIC & PRIVATE respectively.
  14. 14. ENCRYPTION DECRYPTION CIPHERTEXT SENDER RECEIVER PUBLIC KEY PRIVATE KEY
  15. 15. SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
  16. 16. SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY 1) The same algorithm with the same key is used for encryption and decryption. 2) The key must be kept secret. 3) It may be impossible or at least impractical to decipher a message if no other information is available. 1) One algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption. 2) One of the two keys must be kept secret. 3) It may be impossible or at least impractical to decipher a message if no other information is available.
  17. 17.  Defense services  Secure data manipulation  E –commerce  Business transactions  Internet payment systems  User identification systems  Access control  Data security
  18. 18.  By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained.

×