Beruflich Dokumente
Kultur Dokumente
Presented by, GROUP NO:13 Sufiyana Mujawar 38 Aparna Newarekar 42 Supriya Parab - 51
INDEX
1. 2. 3. 4. 5. 6. 7. Encryption and Decryption Process. What is Cryptography? Symmetric Cryptography. Asymmetric Cryptography. Public Key Algorithm. Private Key Algorithm. Digital Signature.
HELLO
Plain Text Encryption
sgkunh
Cipher Text
Decryption Process
Transform cipher text message into plain text message.
sgkunh
Cipher Text Decryption
HELLO
Plain Text
Cryptography
Concept of encryption and decryption together. It is an art or technique for secure communication.
Sender
Receiver
Cryptography
No third party can gain useful data from it. Goal Protect sensitive information transmitted through network.
Type of Cryptography
1. Asymmetric Cryptography: Two different keys used for the encryption and decryption of data. Encryption - public key decryption - private key Private and public key both kept private.
Asymmetric Cryptography
Advantages
Better key distribution. Increase security Provide confidentiality, Authentication.
Disadvantages
Slower Speed
SYMMETRIC CRYPT0GRAPHY
Only one key is used for encryption and decryption. The key used for this, is kept private.
Symmetric Cryptography
Advantages
Faster Speed. Hard to break if using a large key size.
Disadvantages
key distribution.
Encryption
bjkhekyojeiphk
Decryption
Digital Signature.
It is an electronic signature. Ensures that a document is authentic.
Importance of Digital Signature: 1. Data integrity 2. Authentication of Identities 3. Concept of non-repudiation 4. Increase speed
ACCEPT MESSAGE
Original Message Message Digest (MD-2)
Message Digest