KEMBAR78
Cryptography | PDF | Computers
0% found this document useful (0 votes)
94 views11 pages

Cryptography

Cryptography is the process of converting data into a secret code to allow for secure transmission over public networks. It involves encrypting plaintext using an algorithm and key into ciphertext, which is decrypted at the receiving end. There are different types of encryption algorithms that use either symmetric secret keys, where one key encrypts and decrypts, or asymmetric public key cryptography, where different keys encrypt and decrypt. Cryptography ensures encryption of data for privacy, integrity to prevent tampering, identification of senders, and authentication of parties involved in communication.

Uploaded by

Mahak Ahuja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views11 pages

Cryptography

Cryptography is the process of converting data into a secret code to allow for secure transmission over public networks. It involves encrypting plaintext using an algorithm and key into ciphertext, which is decrypted at the receiving end. There are different types of encryption algorithms that use either symmetric secret keys, where one key encrypts and decrypts, or asymmetric public key cryptography, where different keys encrypt and decrypt. Cryptography ensures encryption of data for privacy, integrity to prevent tampering, identification of senders, and authentication of parties involved in communication.

Uploaded by

Mahak Ahuja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CRYPTOGRAPHY

Presentation by:
What is cryptography?
The conversion of
data into a secret
code for
transmission over a
public network.
The word cryptography has come from greek
word krtptos which means HIDDEN SECRET.
Locking up the data
EARLIER CRYPTOGRAPHY WAS
Prior to modern age cryptography was
synonymous with encryption.

The Data Encryption Standard (DES) algorithm
played an important role in the security of electronic
communications in 1976s.

But now It has been replaced by the Advanced
Encryption Standard (AES).



HOW DOES IT HAPPEN?
The original text called "plaintext" is turned
into a coded equivalent called "ciphertext"
using an encryption algorithm.
The ciphertext is decrypted at the receiving
end and turned back into plaintext.

WHAT IS ENCRYPTION ALGORITHM?
Encryption algorithm uses keys.
The "key" is a binary number that is typically
from 40 to 256 bits in length.
The greater the number of bits in the key,
the better the security.

1) Secret key cryptography (SKC): uses
single key for both encryption and
decryption.
2) Public key cryptography (PKC):uses
one key for encryption and another for
decryption.

3) Hash function: uses a mathematical
information to irrevrseibly encrypt
information.
Secret key (symmetric) cryptography
(SKC)
Public key (asymmetric) cryptography
(PKC)
Hash function is one way cryptography.
Since the plain text can not be recovered
from the encrypted information.
Also called as message digest (MD).
Are used by the operating softwares to
encrypt passwords.
Purpose :
Encryption so that no one else can read the
information.
Integrity to ensure that message reaches in
its intact form.
Identification is a process to prove that the
sender really send this message.
Authentication to prove the senders identity.
Plain text output

You might also like