SlideShare una empresa de Scribd logo
1 de 12
Public-key Cryptography KUNDAN KR. PANDEY ROLL NO -   0509014044 COURSE-  MCA 5 TH  SEM. IEC-CET,GREATER NOIDA.
Cryptography ,[object Object],Encryption Plaintext (P) Ciphertext (C) Key (K) Notation : Encryption:  C=E K  (P)  Decryption: P = D K (P)
Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secret-key Cryptography ,[object Object],[object Object],[object Object],[object Object]
Secret-key Cryptography ,[object Object],[object Object]
Public-key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public-key encryption ,[object Object],[object Object],[object Object]
Digital Signatures ,[object Object],[object Object],[object Object]
Digital Signatures ,[object Object],[object Object],[object Object]
Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Certificate Authorities ,[object Object],[object Object],[object Object]
Thanks for your Participation & Co-operation

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cryptography
CryptographyCryptography
Cryptography
 
Information and data security cryptography and network security
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network security
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
cryptography
cryptographycryptography
cryptography
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography
CryptographyCryptography
Cryptography
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Public private key
Public private keyPublic private key
Public private key
 
Cryptography
CryptographyCryptography
Cryptography
 

Destacado

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
Matteo Leonetti
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
Prof. Swapnil V. Kaware
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 

Destacado (20)

PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Security Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing ServicesSecurity Requirement Specification Model for Cloud Computing Services
Security Requirement Specification Model for Cloud Computing Services
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil KawareCryptography & Network Security By, Er. Swapnil Kaware
Cryptography & Network Security By, Er. Swapnil Kaware
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Encryption
EncryptionEncryption
Encryption
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Tutorial membuat pki
Tutorial membuat pkiTutorial membuat pki
Tutorial membuat pki
 
Practical Forensics - Tools & Techniques by Sachin Deodhar
Practical Forensics - Tools & Techniques by Sachin DeodharPractical Forensics - Tools & Techniques by Sachin Deodhar
Practical Forensics - Tools & Techniques by Sachin Deodhar
 

Similar a Public Key Cryptography

computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
jayaprasanna10
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
KuntalSasmal1
 
Ao318992
Ao318992Ao318992
Ao318992
IJMER
 

Similar a Public Key Cryptography (20)

Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
computer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.pptcomputer netwok security Pretty Good Privacy PGP.ppt
computer netwok security Pretty Good Privacy PGP.ppt
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
module 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptxmodule 4_7th sem_ Electronic Mail Security.pptx
module 4_7th sem_ Electronic Mail Security.pptx
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Email security
Email securityEmail security
Email security
 
Ch13
Ch13Ch13
Ch13
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.pptPresentationonCRYPTOGRAPHYppt.ppt  -  Read-Only  -  Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
 
Encryption
EncryptionEncryption
Encryption
 
Ao318992
Ao318992Ao318992
Ao318992
 
CRYPT.pptx
CRYPT.pptxCRYPT.pptx
CRYPT.pptx
 
Ch15
Ch15Ch15
Ch15
 
pgp.ppt.pptx
pgp.ppt.pptxpgp.ppt.pptx
pgp.ppt.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 

Public Key Cryptography