0% found this document useful (0 votes)
600 views20 pages

Submitted To: Er. Parveen Garg (Lect. in CSE & IT Deptt.) Submitted By: Monika Sharma 1606048 CSE-6 Sem

This document provides an overview of cryptography. It discusses how cryptography has been used throughout history for secret communications. The main types of cryptography discussed are secret key cryptography, which uses a single key for encryption and decryption, and public key cryptography, which uses different keys for encryption and decryption. Specific algorithms for each type are also mentioned such as DES, RSA, and hash functions like MD5. The document stresses the increasing importance of cryptography for privacy and security in the modern digital world.

Uploaded by

monika
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
600 views20 pages

Submitted To: Er. Parveen Garg (Lect. in CSE & IT Deptt.) Submitted By: Monika Sharma 1606048 CSE-6 Sem

This document provides an overview of cryptography. It discusses how cryptography has been used throughout history for secret communications. The main types of cryptography discussed are secret key cryptography, which uses a single key for encryption and decryption, and public key cryptography, which uses different keys for encryption and decryption. Specific algorithms for each type are also mentioned such as DES, RSA, and hash functions like MD5. The document stresses the increasing importance of cryptography for privacy and security in the modern digital world.

Uploaded by

monika
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

Presentation

on
Cryptography

Submitted to: Er. Parveen Garg


(Lect. in CSE & IT Deptt.)

Submitted by:
Monika Sharma
1606048
CSE-6th Sem.
Cryptography

Cryptography is Nothing New

Cryptography is the art of "secret writing".

Cryptography was used in ancient times.

Cryptography was used in both sides of the


revolutionary war.

Cryptography has been featured in may


mystery stories, including Sherlock Holmes.
Cryptography
What is Cryptography

Cryptography is a process of communications.

Cryptography takes something readable and makes it


unreadable.

Cryptography is reversible in a controlled manner.

Cryptography does NOT destroy information.


Cryptography

Cryptography is More Important Now Than Ever

Computers and networks are getting faster and faster.

 Connectivity and access are improving and


increasing.
 Companies now exist which require the net for their
very survival.
Individuals are relying on the net for more and more
personal, professional, and commercial activities.
 There is real value on the net in content,
communications, and commerce.
Cryptography
Threats in the Digital World

Criminals will attack systems for financial gain.


Criminals will use systems for financial gain.
 Privacy violations by marketeers, criminals, and
government agencies.

 Identity theft threatens your reputation and your


ability to prove who you say you are.
Cryptography
The Adversaries
Crackers
Insiders
The Press
Lone Criminals
Organized Crime
Industrial Espionage Agents
International Espionage Agents
Terrorists
National Intelligence
Government Agencies
Cryptography

Cryptography to protect our networks


Cryptography to protect our commerce

Cryptography to protect our communications

Cryptography to protect our files


Cryptography to protect our filesystems
Cryptography to protect our identify
Cryptography

Cryptography Can Do Some Really Cool Stuff


 It can protect your privacy
 It can protect your
communications
 It can protect your property
 It can protect your systems
 It can authenticate
 It can authorize
 It can validate
 It stops a lot of lying and cheating

                                                    


TYPES OF CRYPTOGRAPHIC
ALGORITHMS

• Secret Key Cryptography: Uses a single key for both


encryption and decryption

• Public Key Cryptography: Uses one key for encryption


and another for decryption

• Hash Functions: Uses a mathematical transformation to


irreversibly "encrypt" information
WHAT IS SECRET KEY
CRYPTOGRAPHY ?
Secret Key Cryptography - Types
• stream ciphers :Stream ciphers operate on
a single bit (byte or computer word) at a
time, and implement some form of
feedback mechanism so that the key is
constantly changing.
• block ciphers :the scheme encrypts one
block of data at a time using the same key
on each block.
stream ciphers
Stream ciphers come in several flavors but two are
worth mentioning here :

• Self-synchronizing stream ciphers calculate each


bit in the keystream as a function of the previous n
bits in the keystream

• Synchronous stream ciphers generate the


keystream in a fashion independent of the message
stream but by using the same keystream
generation function at sender and receiver.
Block ciphers
Block ciphers can operate in one of several
modes; the following four are the most
important:

• Electronic Codebook (ECB) mode :


• Cipher Block Chaining (CBC) mode :
• Cipher Feedback (CFB) mode :
• Output Feedback (OFB) mode
Cryptography
Symmetric Key Cryptographic Algorithms

DES

Triple-Des

Blowfish

IDEA

Cast

RC4

RC5

TwoFish
WHAT IS PUBLIC KEY
CRYPTOGRAPHY ?
Cryptography
Public Key Cryptographic Algorithms

 RSA
 Diffie-Hellman
 Elliptic curve

       
Hash Functions
Hash functions, also called message digests and
one-way encryption, are algorithms that, in some
sense, use no key .
Among the most common hash functions in use
today in commercial cryptographic applications
are:
• MD2 (RFC 1319)
• MD4 (RFC 1320)
• MD5 (RFC 1321)
• The Secure Hash Algorithm (SHA) ,in
particular, the SHA-1
Why Three Encryption Techniques?

• Hash functions : for data integrity

• Secret-key cryptography: ideally suited


to encrypting messages

• public-key cryptography : for Key exchange


Cryptography
Future Directions

 Crypto Smart Cards


 Crypto Ring Processors
 Java Rings
 Distributed crypto crackers
 S/MIME Cracking Screen Savers
 "Chinese Television" crypto crackers
 Low cost Beowolf supercomputers
******* THE END ********

You might also like