Sie sind auf Seite 1von 22

CRYPTOGRAPHY

Presented by, GROUP NO:13 Sufiyana Mujawar 38 Aparna Newarekar 42 Supriya Parab - 51

INDEX
1. 2. 3. 4. 5. 6. 7. Encryption and Decryption Process. What is Cryptography? Symmetric Cryptography. Asymmetric Cryptography. Public Key Algorithm. Private Key Algorithm. Digital Signature.

Encryption and Decryption process.


Encryption Process: Transform plain text message into cipher text message.

HELLO
Plain Text Encryption

sgkunh
Cipher Text

Decryption Process
Transform cipher text message into plain text message.

sgkunh
Cipher Text Decryption

HELLO
Plain Text

Algorithm and key


To encrypt a plain text message the encryption algorithm is used. To decrypt a received message the decryption algorithm is used. Sender and receiver must agree on common algorithm. Key algorithm known to everybody, it is the key that make data secure.

Cryptography
Concept of encryption and decryption together. It is an art or technique for secure communication.

Sender

Receiver

Cryptography
No third party can gain useful data from it. Goal Protect sensitive information transmitted through network.

Type of Cryptography
1. Asymmetric Cryptography: Two different keys used for the encryption and decryption of data. Encryption - public key decryption - private key Private and public key both kept private.

Asymmetric Cryptography
Advantages
Better key distribution. Increase security Provide confidentiality, Authentication.

Disadvantages
Slower Speed

SYMMETRIC CRYPT0GRAPHY
Only one key is used for encryption and decryption. The key used for this, is kept private.

Symmetric Cryptography
Advantages
Faster Speed. Hard to break if using a large key size.

Disadvantages
key distribution.

limited security. Scalability.

Public Key Algorithm.


Public-key cryptography use asymmetric key algorithms. Each user has a pair of cryptographic keys private key and public key. the key used to encrypt a message is not the same as the key used to decrypt it. Create key pair - secret private key and a published public key. anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt.

Private Key Algorithm


Private key ( or symmetric algorithm). A single key is used for encryption and decryption. The sender and receiver must securely share a key in advance.

Disadvantages of private key algorithm:


1. Secret keys exchanging and storing. 2. Weak passwords. 3. Remembering passwords

Hello . How are you

Encryption

bjkhekyojeiphk

Hello . How are you

Decryption

Digital Signature.
It is an electronic signature. Ensures that a document is authentic.
Importance of Digital Signature: 1. Data integrity 2. Authentication of Identities 3. Concept of non-repudiation 4. Increase speed

Components Of Digital Certificate :


I. Sender s Information:
1. Name and E-mail address 2. Name of the company

II. Certificate information:


1. Expiration date of the public key 2. Serial number of the Digital ID 3. Digital signature of the CA (certification Authority)

III. Sender s public key

DIGITAL SIGNATURE PROCESS:


The sender has two keys; one key is called public key and other is called private key.

Process At Sender s End:

Process At Receiver s END:


Digital Signature Decryption
Message Digest (MD-1) IF (MD-1)=(MD-2)

ACCEPT MESSAGE
Original Message Message Digest (MD-2)

Message Digest

Das könnte Ihnen auch gefallen