Beruflich Dokumente
Kultur Dokumente
KUSUM
SHARMA
M.Sc S/W
CONTENTS
SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION & DECRYPTION
CATEGORIES OF CYRPTOGRAPHY
COMPARISON
CONCLUSION
SECURITY???
THREATS
SECURITY GOALS
CONFIDENTIALITY
INTEGRITY
SECURE
NON-REPUDIATION
CRYPTOGRAPHY
Cryptography is the
BASIC TERMS
PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION & DECRYPTION
KEYS
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAP
HY
ASYMMETRIC
KEY
CRYPTOGRAPH
Y
SYMMETRIC KEY
CRYPTOGRAPHY
Also known as secret key. Sender &
RECEIV
ER
SECRET
KEY
ENCRYPTIO
N
CIPHERTE
XT
DECRYPTIO
N
TRADITIONAL
SUBSTITUTION
TRANSPOSITION
CIPHERS
CIPHER
CIPHER
SUBSTITUTION CIPHERS
A substitution technique is one in
TRANSPOSITION CIPHER
In the transposition technique the positions of
ASYMMETRIC KEY
CRYPTOGRAPHY
Also known as public key
RECEIV
ER
PUBLIC
KEY
ENCRYPTIO
N
PRIVATE
KEY
CIPHERTE
XT
DECRYPTIO
N
KEYS USED IN
CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAP
HY
ASYMMETRIC
KEY
CRYPTOGRAPHY
COMPARISON
SYMMETRIC
CRYPTOGRAPHY
KEY ASYMMETRIC
CRYPTOGRAPHY
KEY
kept secret.
APPLICATIONS
Defense services
Secure data manipulation
E commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security
CONCLUSION
By using of encryption techniques a fair unit
S
K
N
A
TH