SlideShare une entreprise Scribd logo
1  sur  22
INTERNET AND E-COMMERCE
TOPIC:- DIGITAL SIGNATURE , DIGITAL CERTIFICATE AND CRYPTOGRAPHY
PRESENTED BY-
LAKSHAY PARASHAR
NEETU ATARE
PRASHANT SINGH KUSHWAH
B.COM {CA} 3RD SEMESTER
PRESENTED TO -
- ASS.PROFF BHARTI MAM
TABLE OF CONENT :-
-TITLE’S -
1 MEANING OF DIGITAL SIGNATURE.
2 STEPS OF DIGITAL SIGNATURE.
3 DIGITAL CERTIFICATE.
4 CONTENT OF DIGITAL CERTIFICATE.
5 DIFFERENCE BETWEEN DIGITAL SIGNATURE V/S DIGITAL CERTIFICATE.
6 MEANING OF CRYPTOGRAPHY.
7 WHY WE USE CRTPTOGRAPHY.
8 CLASSIFICATION OF CRYPTOGRAPHY.
9 DIFFERENCE BETWEEN CLASSICAL V/S MODERN CRYPTOGRAPHY.
10 CONCLUSION.
MEANING DIGITAL SIGNATURE
A digital signature is a mathematical technique used to
validate the authenticity and integrity of a message,
software or digital document. It's the digital equivalent of a
handwritten signature or stamped seal, but it offers far
more inherent security.
 A digital code which is attached to an electronically
transmitted document to verify its contents and sender’s
identity.
STEPS FOLLOWED IN CREATING A
DIGITAL SIGNATURE
• Message digest is computed by applying hash function on the message and then
message digest is encrypted using private key of sender to form the digital
signature.
• Digital signature is then transmitted with the message.
• Receiver decrypts the digital signature using the public key of sender.
• The receiver now has the message digest.
• The receiver can compute the message digest from the message.
• The message digest computed by receiver and the message digest need to be
same for ensuring integrity.
DIGITAL CERTIFICATE
• Digital certificate is issued by a trusted third party which proves sender’s
identity to the receiver and receiver’s identity to the sender.
A digital certificate is a certificate issued by a Certificate Authority (CA)
to verify the identity of the certificate holder. The CA issues an encrypted
digital certificate containing the applicant’s public key and a variety of
other identification information. Digital certificate is used to attach public
key with a particular individual or an
DIGITAL CERTIFICATE CONTENT
1. NAME OF THE CERTIFICATE HOLDER
2. SERIAL NUMBER WHICH IS USED TO UNIQICKLY IDENTIFIED THE
CERTIFICATE , AN INDIVIDUAL OR AN ENTITY IDENTIFY BY THE
CERTIFICATE.
3. EXPIRATION DATE
4. COPY OF A CETIFICATE HOLDEROR PUBLIC KEY.(USED FOR
DESCRYPTING MESSAGE AND DIGITAL SIGNATURE.
5. DIGITAL SIGNATURE OF THE CERTIFICATE ISSUING AUTHORITY
6. DIGITAL CERTIFICATE IS ALSO SEND WITH THE DIGITAL SIGNATURE
AND MESSAGE
Digital certificate vs digital signature
WHAT IS CRYPOTOGRAPHY
 CRYPTOGRAPHY IS THE SCIENCE OF USING MATHEMATICS TO
ENCRYPT AND DECRYPT A DATA .
 CRYPTOGRAPHY ENABLES US TO STORE SENSTIVE INFORMATION
OR TRANSMIT IT ACROSS INSECURE NETWORKS SO, IT CAN NOT BE
READ BY ANYONE INSTEAD OF A INTENDED RECIPIENT.
WHY WE USE CRYPTOGRAPHY
• FOR ‘ SECRET WRITING ’
• TO ESTABLISH A SHARED SECRET WHEN
OTHER PEOPLE ARE LISTENING.
CLASSIFICATION OF
CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY
• What are symmetric keys in cryptography?
• In cryptography, a symmetric key is one that is used both to encrypt and
decrypt information. This means that to decrypt information, one must
have the same key that was used to encrypt it.
CLASSICAL CRYPTOGRAPHY
• IN The classical cryptography the original data i.e., the plain text is
transformed into the encoded format i.e. cipher text so that we can transmit
this data through insecure communication channels. A data string which
known as key is used to control the transformation of the data from plain
text to cipher text .
TRANSPOSITION CIPHER
• .In cryptography, a transposition cipher is a method of encryption which
scrambles the positions of characters (transposition) without changing the
characters themselves
• A simple example for a transposition cipher is columnar transposition cipher
where each character in the plain text is written horizontally with specified
alphabet width.
SUBSTITUTION CIPHER
• A substitution cipher merely substitutes different letters, numbers, or other
characters for each character in the original text. The most straightforward
example is a simplistic substitution in which each letter of the alphabet is
represented by a numerical digit, starting with 1 for A.
MODERN CRYPTOGRAPHY
• Modern cryptography relies on cryptographic keys, usually a short string of
text, for encoding and decoding messages in combination with cryptographic
algorithms. Based on the type of keys used, cryptography is classified as
either symmetric or asymmetric key cryptography
STREAM CIPHER
• A stream cipher is an encryption technique that works byte by byte to
transform plain text into code that's unreadable to anyone without the
proper key. Stream ciphers are linear, so the same key both encrypts and
decrypts message’s . EX- RC4/ARC4/ARCFOUR is a fast, simple
encryption algorithm developed in 1987 to implement byte-by-byte
encryption using 64 or 128 bits long keys. RC4 is widely used in Transport
Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard
BLOCK CIPHER
• A block cipher is a method of encrypting data in blocks to produce cipher
texts using a cryptographic key and algorithm. The block cipher processes
fixed-size blocks simultaneously, as opposed to a stream cipher, which
encrypts data consume one bit at a time consume .
• EG:-
DIFFERENCE :-
ASYMMATRIC CRYPOTOGRAPHY-
• Asymmetric cryptography, also known as public-key cryptography, is a
process that uses a pair of related keys -- one public key and one private key
-- to encrypt and decrypt a message and protect it from unauthorized access
or use.
THANK
YOU

Contenu connexe

Similaire à Digital Signature, Certificate and Cryptography Guide

Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Ao318992
Ao318992Ao318992
Ao318992IJMER
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
What is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdfWhat is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdfJhon Thompson
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryptionSejahtera Affif
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxGarimaJain745610
 

Similaire à Digital Signature, Certificate and Cryptography Guide (20)

Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Ao318992
Ao318992Ao318992
Ao318992
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
What is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdfWhat is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdf
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Digital signturue
Digital signturueDigital signturue
Digital signturue
 
Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 

Dernier

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Dernier (20)

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Digital Signature, Certificate and Cryptography Guide

  • 1. INTERNET AND E-COMMERCE TOPIC:- DIGITAL SIGNATURE , DIGITAL CERTIFICATE AND CRYPTOGRAPHY PRESENTED BY- LAKSHAY PARASHAR NEETU ATARE PRASHANT SINGH KUSHWAH B.COM {CA} 3RD SEMESTER PRESENTED TO - - ASS.PROFF BHARTI MAM
  • 2. TABLE OF CONENT :- -TITLE’S - 1 MEANING OF DIGITAL SIGNATURE. 2 STEPS OF DIGITAL SIGNATURE. 3 DIGITAL CERTIFICATE. 4 CONTENT OF DIGITAL CERTIFICATE. 5 DIFFERENCE BETWEEN DIGITAL SIGNATURE V/S DIGITAL CERTIFICATE. 6 MEANING OF CRYPTOGRAPHY. 7 WHY WE USE CRTPTOGRAPHY. 8 CLASSIFICATION OF CRYPTOGRAPHY. 9 DIFFERENCE BETWEEN CLASSICAL V/S MODERN CRYPTOGRAPHY. 10 CONCLUSION.
  • 3. MEANING DIGITAL SIGNATURE A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security.  A digital code which is attached to an electronically transmitted document to verify its contents and sender’s identity.
  • 4. STEPS FOLLOWED IN CREATING A DIGITAL SIGNATURE • Message digest is computed by applying hash function on the message and then message digest is encrypted using private key of sender to form the digital signature. • Digital signature is then transmitted with the message. • Receiver decrypts the digital signature using the public key of sender. • The receiver now has the message digest. • The receiver can compute the message digest from the message. • The message digest computed by receiver and the message digest need to be same for ensuring integrity.
  • 5.
  • 6. DIGITAL CERTIFICATE • Digital certificate is issued by a trusted third party which proves sender’s identity to the receiver and receiver’s identity to the sender. A digital certificate is a certificate issued by a Certificate Authority (CA) to verify the identity of the certificate holder. The CA issues an encrypted digital certificate containing the applicant’s public key and a variety of other identification information. Digital certificate is used to attach public key with a particular individual or an
  • 7. DIGITAL CERTIFICATE CONTENT 1. NAME OF THE CERTIFICATE HOLDER 2. SERIAL NUMBER WHICH IS USED TO UNIQICKLY IDENTIFIED THE CERTIFICATE , AN INDIVIDUAL OR AN ENTITY IDENTIFY BY THE CERTIFICATE. 3. EXPIRATION DATE 4. COPY OF A CETIFICATE HOLDEROR PUBLIC KEY.(USED FOR DESCRYPTING MESSAGE AND DIGITAL SIGNATURE. 5. DIGITAL SIGNATURE OF THE CERTIFICATE ISSUING AUTHORITY 6. DIGITAL CERTIFICATE IS ALSO SEND WITH THE DIGITAL SIGNATURE AND MESSAGE
  • 8.
  • 9. Digital certificate vs digital signature
  • 10. WHAT IS CRYPOTOGRAPHY  CRYPTOGRAPHY IS THE SCIENCE OF USING MATHEMATICS TO ENCRYPT AND DECRYPT A DATA .  CRYPTOGRAPHY ENABLES US TO STORE SENSTIVE INFORMATION OR TRANSMIT IT ACROSS INSECURE NETWORKS SO, IT CAN NOT BE READ BY ANYONE INSTEAD OF A INTENDED RECIPIENT.
  • 11. WHY WE USE CRYPTOGRAPHY • FOR ‘ SECRET WRITING ’ • TO ESTABLISH A SHARED SECRET WHEN OTHER PEOPLE ARE LISTENING.
  • 13. SYMMETRIC KEY CRYPTOGRAPHY • What are symmetric keys in cryptography? • In cryptography, a symmetric key is one that is used both to encrypt and decrypt information. This means that to decrypt information, one must have the same key that was used to encrypt it.
  • 14. CLASSICAL CRYPTOGRAPHY • IN The classical cryptography the original data i.e., the plain text is transformed into the encoded format i.e. cipher text so that we can transmit this data through insecure communication channels. A data string which known as key is used to control the transformation of the data from plain text to cipher text .
  • 15. TRANSPOSITION CIPHER • .In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves • A simple example for a transposition cipher is columnar transposition cipher where each character in the plain text is written horizontally with specified alphabet width.
  • 16. SUBSTITUTION CIPHER • A substitution cipher merely substitutes different letters, numbers, or other characters for each character in the original text. The most straightforward example is a simplistic substitution in which each letter of the alphabet is represented by a numerical digit, starting with 1 for A.
  • 17. MODERN CRYPTOGRAPHY • Modern cryptography relies on cryptographic keys, usually a short string of text, for encoding and decoding messages in combination with cryptographic algorithms. Based on the type of keys used, cryptography is classified as either symmetric or asymmetric key cryptography
  • 18. STREAM CIPHER • A stream cipher is an encryption technique that works byte by byte to transform plain text into code that's unreadable to anyone without the proper key. Stream ciphers are linear, so the same key both encrypts and decrypts message’s . EX- RC4/ARC4/ARCFOUR is a fast, simple encryption algorithm developed in 1987 to implement byte-by-byte encryption using 64 or 128 bits long keys. RC4 is widely used in Transport Layer Security, Secure Sockets Layer, and the IEEE 802.11 WLAN standard
  • 19. BLOCK CIPHER • A block cipher is a method of encrypting data in blocks to produce cipher texts using a cryptographic key and algorithm. The block cipher processes fixed-size blocks simultaneously, as opposed to a stream cipher, which encrypts data consume one bit at a time consume . • EG:-
  • 21. ASYMMATRIC CRYPOTOGRAPHY- • Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.