Top Banner

of 15

Cryptography by ME 2

Apr 05, 2018

Download

Documents

ecstacy007
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/31/2019 Cryptography by ME 2

    1/15

    1

    CRYPTOGRAPHY

    Made by:-PUSHPENDRA PANDEY

    B.TECH 3RD YEAR

    SARASWATI INSTITUTE OF TECHNOLOGY

    AND MANAGEMENT

    ELECTRONICS AND COMMUNICATION

  • 7/31/2019 Cryptography by ME 2

    2/15

    CRYPTOGRAPHY

    Cryptography,a word with greekorigins which means secret writing.

    However we use the term refers toscience and art of transforming amessage to make them secure andimmune of attack.

    2

  • 7/31/2019 Cryptography by ME 2

    3/15

    INTRODUCTION

    Hidden writing

    Increasingly used to protect information

    Can ensure confidentiality

    Integrity and Authenticity too

    3

  • 7/31/2019 Cryptography by ME 2

    4/15

    TERMS OF CRYPTOGRAPHY

    PLAIN TEXT

    The original message before beingtransformed is called plain text.

    CIPHER TEXT

    The message after transformation is called as

    cipher text. 4

  • 7/31/2019 Cryptography by ME 2

    5/15

    TERMS CONT

    ALICE The person who sends the secure

    data called alice.

    BOB

    The person who receives the data.

    EVE The person or medium who some

    how disturbs the communication

    between alice and bob. 5

  • 7/31/2019 Cryptography by ME 2

    6/15

    CRYPTOGRAPHY MECHANISM

    ENCRYPTION An encryption algorithm transform the plain

    text into cipher text. it is done by sender.

    DECRYPTION An decryption algorithm transform the the

    cipher text back into plain text.it is done by

    reciever. 6

  • 7/31/2019 Cryptography by ME 2

    7/15

    KEY IN CRYPTOGRAPHY

    KEY A sequence or a number that controls the

    operation and behavior of the cryptographicalgorithm.

    TYPES OF KEY Symmetric key

    Asymmetric key 7

  • 7/31/2019 Cryptography by ME 2

    8/15

    TYPES OF KEY

    SYMMETRIC KEYS

    It is also termed as secret key.

    It is used by both sender and receiver. The sender uses this key and incryption

    algorithm to incrypt the data.

    The receiver uses decryption algorithm and

    same key to decrypt the data received 8

  • 7/31/2019 Cryptography by ME 2

    9/15

    TYPES OF KEY

    ASYMMETRIC KEY These are of two types

    Private key

    Public key

    Private key is kept by receiver.

    Public key is announced to the public.

    Public key is used for encryption is different

    from the private key that is used for decryption 9

  • 7/31/2019 Cryptography by ME 2

    10/15

    PURPOSE OF CRYPTOGRAPHY IN

    NETWORK SECURITY

    AUTHENTICITY PRIVACY/CONFIDENTIALITY INTEGRITY NON REPUDIATION SECURITY

    10

  • 7/31/2019 Cryptography by ME 2

    11/15

    CONT..

    AUTHENTICATION The process of proving ones identity.

    PRIVACY/CONFIDENTIALITY Ensuring that no one can read the

    message except intended receiver.

    11

  • 7/31/2019 Cryptography by ME 2

    12/15

    CONT

    INTEGRITY

    Assuring the receiver that receivedmessage has not altered anyway from

    the original. NON REPUDIATION

    A mechanism to prove that sender really

    send the received message. 12

  • 7/31/2019 Cryptography by ME 2

    13/15

    APPLICATIONS

    Authentication Application

    Electronic Mail Security

    IP Security Web Security

    13

  • 7/31/2019 Cryptography by ME 2

    14/15

    THANK YOU

    14

  • 7/31/2019 Cryptography by ME 2

    15/15

    ANY QUARIES

    ?