SlideShare a Scribd company logo
1 of 15
CRYPTOGRAPHY
CONTENTS
• What is Cryptography ?
• Types of Cryptographic Techniques
• Why Different Encryption Techniques ?
• Drawbacks of Classical Cryptography
• Need for New Techniques
• New Trends in Cryptography
• Conclusion
What is Cryptography ?
• Cryptography is the practice and study of hiding information.
• It is a branch of both mathematics and computer science , and is affiliated
  closely with information theory, computer security, and engineering.
• Cryptography is used in applications present in technologically advanced
  societies.
• Ex: ATM cards, computer passwords, and electronic commerce etc.
Types of Cryptographic Techniques
• They are categorized based on the number of keys that are employed for
  encryption and decryption.
• The three types are :-
   •   Secret Key Cryptography
   •   Public Key Cryptography
   •   Hash Functions
Secret Key Cryptography
• Secret-key Cryptography involves using the same key for encryption and
  decryption.




• Key used for Encryption must be as long as the message.
• The main disadvantages of Secret Key Cryptography is exchange of keys.
Public Key Cryptography
• Public-key cryptography requires two separate keys, one of which is secret
  and one of which is public.
• In this public key is used for encryption and private key is used for decryption.
Hash Functions
•It does not use any key for encryption.
•It uses a mathematical transformation to irreversibly "encrypt" information.
•Here the message is converted into a fixed length hash value.
Why Different Encryption
                 Techniques ?
•Hash Function are used for ensuring data integrity.
•Secret key cryptography is ideally suitable for encrypting messages.
•Public key cryptography is also used for encrypting messages but here different
keys are used for encryption and decryption, so it is more secured than secret
key cryptography.
Drawbacks of Classical
                   Cryptography
•Here the Encryption and Decryption Algorithms are publicly available.
•The privacy of the data transmission depends only on secrecy of a key.
•Thus if the key is revealed then the data can be compromised.
Need for new Techniques
•Today everything is on the internet.
•Thus Security plays a vital role in maintaining data.
•The older techniques are vulnerable to attacks .
•So to keep the data secure new techniques are required which are not
vulnerable.
New Trends in Cryptography
•The two new Technologies include :
 • Elliptic Curve Cryptography
 • Quantum Cryptography
 • Pairing based cryptography
Elliptic Curve Cryptography
Elliptic Curve Cryptography was proposed in 1985 by Victor Miller.
Two Points P and Q are given where Q is the public key.
Consider an integer n such that P=nQ .
An attacker might know P and Q but it is very difficult to find n which is the private key.
Quantum cryptography
It describes use of quantum mechanical effects to perform cryptographic tasks
Quantum communication to securely exchange a key
Quantum computers can only break into such encryption schemes
Pairing based cryptography
Pairs elements of two groups to construct a hybrid cryptographic system
Eg bilinear mapping
Using two or more vectors to yield a third vector to be used as key
CONCLUSION

More Related Content

What's hot

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Basic cryptography
Basic cryptographyBasic cryptography
Basic cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Viewers also liked

Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Navigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In FloridaNavigating Electronic Signature Law In Florida
Navigating Electronic Signature Law In Florida
 
Classical cipher
Classical cipherClassical cipher
Classical cipher
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Cryptanalysis Project Report
Cryptanalysis Project ReportCryptanalysis Project Report
Cryptanalysis Project Report
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architecture
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 

Similar to Cryptography

information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Crytography
CrytographyCrytography
Crytography
 
Security
SecuritySecurity
Security
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
Cryptography
CryptographyCryptography
Cryptography
 
groupWork.pptx
groupWork.pptxgroupWork.pptx
groupWork.pptx
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
Network security
Network securityNetwork security
Network security
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 

More from أحلام انصارى

Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
أحلام انصارى
 

More from أحلام انصارى (20)

Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 

Cryptography

  • 2. CONTENTS • What is Cryptography ? • Types of Cryptographic Techniques • Why Different Encryption Techniques ? • Drawbacks of Classical Cryptography • Need for New Techniques • New Trends in Cryptography • Conclusion
  • 3. What is Cryptography ? • Cryptography is the practice and study of hiding information. • It is a branch of both mathematics and computer science , and is affiliated closely with information theory, computer security, and engineering. • Cryptography is used in applications present in technologically advanced societies. • Ex: ATM cards, computer passwords, and electronic commerce etc.
  • 4. Types of Cryptographic Techniques • They are categorized based on the number of keys that are employed for encryption and decryption. • The three types are :- • Secret Key Cryptography • Public Key Cryptography • Hash Functions
  • 5. Secret Key Cryptography • Secret-key Cryptography involves using the same key for encryption and decryption. • Key used for Encryption must be as long as the message. • The main disadvantages of Secret Key Cryptography is exchange of keys.
  • 6. Public Key Cryptography • Public-key cryptography requires two separate keys, one of which is secret and one of which is public. • In this public key is used for encryption and private key is used for decryption.
  • 7. Hash Functions •It does not use any key for encryption. •It uses a mathematical transformation to irreversibly "encrypt" information. •Here the message is converted into a fixed length hash value.
  • 8. Why Different Encryption Techniques ? •Hash Function are used for ensuring data integrity. •Secret key cryptography is ideally suitable for encrypting messages. •Public key cryptography is also used for encrypting messages but here different keys are used for encryption and decryption, so it is more secured than secret key cryptography.
  • 9. Drawbacks of Classical Cryptography •Here the Encryption and Decryption Algorithms are publicly available. •The privacy of the data transmission depends only on secrecy of a key. •Thus if the key is revealed then the data can be compromised.
  • 10. Need for new Techniques •Today everything is on the internet. •Thus Security plays a vital role in maintaining data. •The older techniques are vulnerable to attacks . •So to keep the data secure new techniques are required which are not vulnerable.
  • 11. New Trends in Cryptography •The two new Technologies include : • Elliptic Curve Cryptography • Quantum Cryptography • Pairing based cryptography
  • 12. Elliptic Curve Cryptography Elliptic Curve Cryptography was proposed in 1985 by Victor Miller. Two Points P and Q are given where Q is the public key. Consider an integer n such that P=nQ . An attacker might know P and Q but it is very difficult to find n which is the private key.
  • 13. Quantum cryptography It describes use of quantum mechanical effects to perform cryptographic tasks Quantum communication to securely exchange a key Quantum computers can only break into such encryption schemes
  • 14. Pairing based cryptography Pairs elements of two groups to construct a hybrid cryptographic system Eg bilinear mapping Using two or more vectors to yield a third vector to be used as key