Top Banner
Concept of Cryptography Presented by KuralAmuthan.C.V Nirmalkumar.R.E Ramkumar.M Manimaran.M
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptography

Concept of Cryptography

Presented by

KuralAmuthan.C.VNirmalkumar.R.E

Ramkumar.MManimaran.M

Page 2: Cryptography

What is cryptography

Cryptography is the science of information security.

The word is derived from the Greek, kryptos- hidden Graphy-writing.

It’s a efficient method of transmitting messages in a secured manner.

Page 3: Cryptography

History of cryptography

The history of cryptography has been explained in following slides with pictorial representation

It is further classified into • Ancient cryptography• Modern cryptography

Page 4: Cryptography

Ancient cryptography

Sumerian’s cuneiform writing (3500 BC)

Page 5: Cryptography

Egypt's cryptography writing(1900 BC)

Ancient cryptography

Page 6: Cryptography

Ancient Cryptography

History tells us that Julius Caesar enciphered his dispatches by writing D for A Ex: If message is “CALL ME” means, It is encrypted to“FDOO PH“

Page 7: Cryptography

Modern cryptography

“The Enigma Machine” invented by German military during world war I.

Page 8: Cryptography

Modern cryptography

German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages

Page 9: Cryptography

Purpose of cryptography Authentication: The process of proving one's identity.

Confidentiality: Ensuring that no one can read the

message except the intended receiver.

Integrity: Assuring the receiver that the received

message has not been altered in any way from the original.

Non-repudiation: A mechanism to prove that the

sender really sent this message

Page 10: Cryptography

Outline of Cryptography

Page 11: Cryptography

Terminology

Key word The shared secret used to keep the message secret

Ciphertext The encrypted message

Encryption The process of turning plaintext to ciphertext

Decryption Opposite to the Encryption

Page 12: Cryptography

Types of Cryptography

Symmetry cryptography

Asymmetry cryptography

Hash function

Page 13: Cryptography

Symmetric Cryptography

Uses same key for both encryption and decryption

Page 14: Cryptography

Asymmetric Cryptography

Also known as public key Uses two key (public & private) for encryption and decryption

Public key Private key

Page 15: Cryptography

Hash function

Hash function also called as message digest

It doesn't require the key, since plaintext not

recovered from ciphertext.

Hash function are typically used for

verification of file content.

Page 16: Cryptography

Application of cryptography

There are many applications available. Few of them listed below.Digital Signature Smart card Electronic commerce Computer password ATM

Page 17: Cryptography

Conclusion

Cryptography is only the part of security system Its not a magic bullet Even though technology improved, there is some deflect. No one in world is perfect and stable we try improve our self in future needs

Page 18: Cryptography

THANK YOU!!!

Page 19: Cryptography

ANY QUERIES!!!!