SlideShare a Scribd company logo
1 of 20
Download to read offline
Created By : Rahul Khanvani
Roll No : 47
Department Of Computer Science
Cryptography:
Securing the Information.
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Introduction
» EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?
 Does it look like nonsense to you ?
 Did you notice that I asked you the same question twice ?
 Confused ?
» Replace Each word With its Alphabet used before.
» The Cryptography is Simple 
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Cryptography is the art and science of converting ordinary information
into gibberish and converting it back to its original, meaningful form.
» Its Amazing how rotating the alphabets by even just one position is
enough to confuse human mind !
» We Call It Rotating Words.
» To convert data in meaningful form you need an algorithm ,
» you can also create your own small algorithm.
What Is Cryptography ?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» If You Say No Then I Can Say You May B Don’t Use Cryptography.
 Do You Use Gmail ?
 Do You use Facebook ?
 Have you Ever Opened a File Containing Password ?
 Did U Use HTTPS Site ?
 Do You Fill Forms on Internet ?
» Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A
Kind Of Cryptogrpahy.
 E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives.
Who Uses Cryptography ?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Plaintext – A message in its natural format readable by an attacker
» Cipher text – Message altered to be unreadable by anyone except the
intended recipients
» Key – Sequence that controls the operation and behavior of the
cryptographic algorithm
» Key-space – Total number of possible values of keys in a crypto
algorithm
» Encryption
 Plain text  Cipher text
» Decryption
 Cipher text  Plain text
Terms Used In Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Defending against external/internal hackers
» Securing E-commerce
» Securing bank accounts/electronic transfers
» Securing intellectual property
Information Security for…
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Pervasiveness of email/networks
» Online storage of sensitive information
» Insecure technologies (e.g. wireless)
» Trend towards paperless society
» Weak legal protection of email privacy.
Threats to Information Security
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
How To Send A Secure Email Or Password Protected Email?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Types Of Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Secret Writing
Steganography
Cryptography
Types of Secret Writing
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Steganography – covered writing
 – is an art of hiding information
» Popular contemporary steganography
technologies hide information in images.
Steganography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Encryption means the transformation of data by the use of
Cryptography to produce unintelligible data to ensure confidentiality
» The inverse function of encryption is called as decryption
Encryption and decryption:-
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Private (symmetric, secret) key – the same key used for
encryption/decryption
» Problem of key distribution
» How Do Both Person Agree On Same Key ?
Private Key Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Public (asymmetric) key cryptography – a public key used for encryption
and private key for decryption
» Key distribution problem solved
Public Key Cryptography
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
 DES (Data Encryption Standard) and derivatives: double DES and triple DES
 IDEA (International Data Encryption Standard)
 Blowfish
 RC5 (Rivets Cipher #5)
 AES (Advance Encryption Standard)
Currently Available Crypto Algorithms (private key)
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
 RSA (Rivest, Shamir, Adleman)
 DH (Diffie-Hellman Key Agreement Algorithm)
 ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)
 RPK (Raike Public Key)
Currently Available Crypto Algorithms (public key)
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
» Algorithms are not theoretically unbreakable: successful attacks in the
future are possible.
» Encryption does not guarantee security!
» Many ways to beat a crypto system NOT dependent on cryptanalysis,
such as:
 Viruses, worms, hackers, etc.
 TEMPEST attacks,
 Unauthorized physical access to secret keys
» Cryptography is only one element of comprehensive computer security
How Secure are Today’s Technologies?
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com
Thank You…
For More Visit Bnarybuzz.wordpress.com
Rahul Khanvani For More Visit
BinaryBuzz.Wordpress.com

More Related Content

Similar to Cryptography Securing Information

Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Basic Cryptography & Security
Basic Cryptography & SecurityBasic Cryptography & Security
Basic Cryptography & SecurityHoffman Lab
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalRomania Testing
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Razi Rais
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...YK Chang
 
Httpillage lascon-2015
Httpillage lascon-2015Httpillage lascon-2015
Httpillage lascon-2015forcedrequest
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...All Things Open
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in ActionJosh Sokol
 
Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.C a s e y R o s i n i
 

Similar to Cryptography Securing Information (20)

Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
Cryptography
CryptographyCryptography
Cryptography
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Basic Cryptography & Security
Basic Cryptography & SecurityBasic Cryptography & Security
Basic Cryptography & Security
 
Kiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-finalKiran karnad rtc2014 ghdb-final
Kiran karnad rtc2014 ghdb-final
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...How to get along with HATEOAS without letting the bad guys steal your lunch -...
How to get along with HATEOAS without letting the bad guys steal your lunch -...
 
Httpillage lascon-2015
Httpillage lascon-2015Httpillage lascon-2015
Httpillage lascon-2015
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...How to Use Cryptography Properly:  Common Mistakes People Make When Using Cry...
How to Use Cryptography Properly: Common Mistakes People Make When Using Cry...
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
Learn Hacking
Learn HackingLearn Hacking
Learn Hacking
 
Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.Memory-Based Library Loading: Someone Did That Already.
Memory-Based Library Loading: Someone Did That Already.
 

More from Rahul Khanwani

Online examination system
Online examination systemOnline examination system
Online examination systemRahul Khanwani
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On GoogleRahul Khanwani
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examplesRahul Khanwani
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) modelRahul Khanwani
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algorithamRahul Khanwani
 
Data compression introduction
Data compression introductionData compression introduction
Data compression introductionRahul Khanwani
 

More from Rahul Khanwani (8)

Online examination system
Online examination systemOnline examination system
Online examination system
 
Power goggling - To Search Easier On Google
Power goggling - To Search Easier On GooglePower goggling - To Search Easier On Google
Power goggling - To Search Easier On Google
 
Er diagram practical examples
Er diagram practical examplesEr diagram practical examples
Er diagram practical examples
 
Entity relationship(er) model
Entity relationship(er) modelEntity relationship(er) model
Entity relationship(er) model
 
Data compression huffman coding algoritham
Data compression huffman coding algorithamData compression huffman coding algoritham
Data compression huffman coding algoritham
 
Data compression introduction
Data compression introductionData compression introduction
Data compression introduction
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Google glass
Google glassGoogle glass
Google glass
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Cryptography Securing Information

  • 1. Created By : Rahul Khanvani Roll No : 47 Department Of Computer Science Cryptography: Securing the Information. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 2. Introduction Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 3. Introduction » EPFT UIJT MPPL MJLF OPOTFOTF UP ZPV ?  Does it look like nonsense to you ?  Did you notice that I asked you the same question twice ?  Confused ? » Replace Each word With its Alphabet used before. » The Cryptography is Simple  Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 4. » Cryptography is the art and science of converting ordinary information into gibberish and converting it back to its original, meaningful form. » Its Amazing how rotating the alphabets by even just one position is enough to confuse human mind ! » We Call It Rotating Words. » To convert data in meaningful form you need an algorithm , » you can also create your own small algorithm. What Is Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 5. » If You Say No Then I Can Say You May B Don’t Use Cryptography.  Do You Use Gmail ?  Do You use Facebook ?  Have you Ever Opened a File Containing Password ?  Did U Use HTTPS Site ?  Do You Fill Forms on Internet ? » Most Of You Are Saving Your GF/BF’s No. As Their Nick Names Is Also A Kind Of Cryptogrpahy.  E.g Saving Ur G.F’s No As “Battery Low” To Hide The Contact From Relatives. Who Uses Cryptography ? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 6. » Plaintext – A message in its natural format readable by an attacker » Cipher text – Message altered to be unreadable by anyone except the intended recipients » Key – Sequence that controls the operation and behavior of the cryptographic algorithm » Key-space – Total number of possible values of keys in a crypto algorithm » Encryption  Plain text  Cipher text » Decryption  Cipher text  Plain text Terms Used In Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 7. » Defending against external/internal hackers » Securing E-commerce » Securing bank accounts/electronic transfers » Securing intellectual property Information Security for… Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 8. » Pervasiveness of email/networks » Online storage of sensitive information » Insecure technologies (e.g. wireless) » Trend towards paperless society » Weak legal protection of email privacy. Threats to Information Security Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 9. How To Send A Secure Email Or Password Protected Email? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 10. Types Of Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 11. Secret Writing Steganography Cryptography Types of Secret Writing Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 12. » Steganography – covered writing  – is an art of hiding information » Popular contemporary steganography technologies hide information in images. Steganography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 13. Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 14. » Encryption means the transformation of data by the use of Cryptography to produce unintelligible data to ensure confidentiality » The inverse function of encryption is called as decryption Encryption and decryption:- Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 15. » Private (symmetric, secret) key – the same key used for encryption/decryption » Problem of key distribution » How Do Both Person Agree On Same Key ? Private Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 16. » Public (asymmetric) key cryptography – a public key used for encryption and private key for decryption » Key distribution problem solved Public Key Cryptography Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 17.  DES (Data Encryption Standard) and derivatives: double DES and triple DES  IDEA (International Data Encryption Standard)  Blowfish  RC5 (Rivets Cipher #5)  AES (Advance Encryption Standard) Currently Available Crypto Algorithms (private key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 18.  RSA (Rivest, Shamir, Adleman)  DH (Diffie-Hellman Key Agreement Algorithm)  ECDH (Elliptic Curve Diffie-Hellman Key Agreement Algorithm)  RPK (Raike Public Key) Currently Available Crypto Algorithms (public key) Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 19. » Algorithms are not theoretically unbreakable: successful attacks in the future are possible. » Encryption does not guarantee security! » Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:  Viruses, worms, hackers, etc.  TEMPEST attacks,  Unauthorized physical access to secret keys » Cryptography is only one element of comprehensive computer security How Secure are Today’s Technologies? Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com
  • 20. Thank You… For More Visit Bnarybuzz.wordpress.com Rahul Khanvani For More Visit BinaryBuzz.Wordpress.com