Sie sind auf Seite 1von 25

Guided By Submitted By Ms. ROMILA CHOPRA SUDHANSHU JAIN 4th yr EC www.powerpointpresentationon.blogspot.

com

INTODUCTION HISTORY OBEJECTIVE & OVERVIEW APPLICATIONS CRYPTOGRAPHY COMPONENTS TERMINOLOGY ASPECTS TYPES OF CRYPTOGRAPHY ADVANTAGES CONCLUSION REFERENCES

Cryptography is the science of information security. The word is derived from the Greek kryptos, meaning hidden. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.

Confidentiality:- the information cannot be understood by anyone for whom it was unintended. Integrity :-the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. Authentication :-the sender and receiver can confirm each others identity and the origin/destination of the information.

Overview of Cryptography & Its Applications


People wants and needs privacy and security while communicating. In the past, cryptography is heavily used for military applications to keep sensitive information secret from enemies (adversaries). Nowadays, with the technologic progress as our dependency on electronic systems has increased we need more sophisticated techniques.

Cryptography provides most of the methods and techniques for a secure communication

Cryptography components

Encryption It is a process of changing or converting normal text or data information into gibberish text. Decryption It is a process of changing or converting gibberish text back to correct message or data by using encryption method.

Terminology
Cryptology : All-inclusive term used for the study of secure communication over non-secure channels. Cryptography : The process of designing systems to realize secure communications over non-secure channels. Cryptoanalysis : The discipline of breaking the cryptographic systems. Coding Theory : Deals with representing the information using codes. It covers compression, secrecy, and error correction.

Basic terminology
Plaintext: original message to be encrypted Ciphertext: the encrypted message Enciphering or encryption: the process of converting plaintext into ciphertext Encryption algorithm: performs encryption
Two inputs: a plaintext and a secret key

10

Deciphering or decryption: recovering plaintext from ciphertext


Decryption algorithm: performs decryption
Two inputs: ciphertext and secret key

Secret key: same key used for encryption and decryption


Also referred to as a symmetric key

11

Cipher or cryptographic system : a scheme for encryption and decryption


Cryptography: science of studying ciphers Cryptanalysis: science of studying attacks against cryptographic systems

Cryptology: cryptography + cryptanalysis

12

Ciphers
Symmetric cipher: same key used for encryption and decryption
Block cipher: encrypts a block of plaintext at a time

(typically 64 or 128 bits)


Stream cipher: encrypts data one bit or one byte at a

time

Asymmetric cipher: different keys used for encryption and decryption


13

The Aspects of Cryptography


Modern cryptography heavily depends on mathematics and the usage of digital systems. It is a inter-disciplinary study of basically three fields: Mathematics Computer Science Electrical Engineering Without having a complete understanding of crypto analysis (or cryptoanalytic techniques) it is impossible to design good (secure, unbreakable) cryptographic systems.

It makes use of other disciplines such as error-correcting codes compression.

Categories of cryptography

10

A single common encryption key is used to encode and decode messages. Both sender and receiver must know the common key. The common key need to be exchanged before hand by some other secure method. Symmetric encryption is simple and fast. But - key management is impractical with large number of senders and receivers.

11

Symmetric-key cryptography

11

Asymmetric-key cryptography
Asymmetric system under, which two different keys are used to encrypt and decrypt the message or received data packet. On public key is used to encrypt the data or message and the private key on receiving end is used to decrypt the message or data packet. Each user has a Public key and a corresponding Private (secret) key

12

Asymmetric-key cryptography

Keys used in cryptography

Sendersign messages by means of his private secret key. Recipient verify the senders signature by means of the senders public key. The senders identity is certified by means of aCertificate which is digitally signed by a trusted third party.

public-key cryptography Increased security and convenience. public-key cryptography is best suited for an open multi-user environment. Symmetric encryption is simple and fast.

cryptography = physics + Information theory Information is physical. Information gain implies disturbances.

Das könnte Ihnen auch gefallen