SlideShare a Scribd company logo
2
Most read
5
Most read
12
Most read
cryptography
What is cryptography?
Cryptography is the practice and study of techniques
for secure communication in the presence of third parties
(called adversaries).

More generally, it is about constructing and analyzing that
overcome the influence of adversaries and which are
related to various aspects in information security such as
data confidentiality, data integrity, and authentication.
cryptography
HISTORY OF CRYPTOGRAPHY
THE ORIGIN OF CRYPTOGRAPHY TOOK PLCAE AROUND
 2000 B.C. IN EGYPT.
Before the modern era, cryptography was concerned solely with
message confidentiality (i.e., Encryption)—conversion of
messages from a comprehensible form into an incomprehensible
one and back again at the other end, rendering it unreadable by
interceptors or eavesdroppers without secret knowledge.

Encryption was used to ensure secrecy in communications,
such as those of spies, military leaders, and diplomats.
CLASSIC CRYPTOGRAPHY
 The main classical cipher types are transposition
ciphers, which rearrange the order of letters in a message and
substitution ciphers, which symmetrically replace letters with
other letters.

EXAMPLE., ‘hello world’ becomes 'ehlol owrdl' in a trivially
simple rearrangement scheme.



              A cipher (or cypher) is an algorithm for performing
              encryption or decryption — a series of well-defined
              steps that can be followed as a procedure.
An early substitution cipher was the Caesar cipher, in which each letter in
the plain text was replaced by a letter some fixed number of positions further
down the alphabet.

Suetonius reports that Julius Caesar used it with a shift of three to
communicate with his generals.




                   Reconstructed ancient Greek scytale
                   (rhymes with "Italy"), an early cipher device.
cryptography
cryptography
THE COMPUTER
     ERA

       OR

         MODERN
         CRYPTOGRAPHY
• The development of digital computers and electronics after WWII
  made possible much more complex ciphers. Furthermore, computers
  allowed for the encryption of any kind of data represent able in any
  binary format, unlike classical ciphers which only encrypted written
  language texts; this was new and significant.




                   German Lorenz cipher machine, used in World
                   War II to encrypt very-high-level general
                   staff messages.
•These days a fine example of cryptography is
Credit card with smart-card capabilities. The 3-by-5-mm chip
embedded in the card is shown, enlarged. Smart cards combine low cost
and portability with the power to compute cryptographic algorithms
Padlock icon from the Firefox Web
browser, meant to indicate a page has been sent
in SSL or TLS-encrypted protected form.
However, seeing an icon results when code is
intended to render it. Malicious code can provide
the icon even when the connection is not actually
being protected by SSL or TLS
This is a
CRYPTOGRAPHY
PIECE
The mod e r n f ie ld o f c rypt ogra phy c a n be
d ivid e d in t o s e ve r a l a r e a s o f s t u d y :


 SYMMETRIC KEY CRYPTOGRAPHY :
  Symmetric-key cryptography refers to encryption methods in
  which both the sender and receiver share the same key

 PUBLIC KEY CRYTOGRAPHY :
  Public key cryptography refers to encryption methods in which
  both the sender and receiver share the different keys.


              The basic elements of cryptography are:
              1. Encryption
              2. Decryption
              3. Key
cryptography
The above example was of symmetric key cryptography.




           Here we can see the difference between PUBLIC and
           PRIVATE key
•The Data Encryption Standard (DES) and the Advanced
 Encryption Standard (AES) are block cipher designs which have
 been designated cryptography standards by the US government
 (though DES's designation was finally withdrawn after the AES was
 adopted).
PUBLIC KEY ENCRYPTION(Asymmetric key)
APPLICATIONS OF
CRYPTOGRAPHY
• ATM
• e-mail
• Secure remote access
• ISDN
• PEM
• PGD
• Smart Cards and many more
cryptography

More Related Content

PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Cryptography.ppt
kusum sharma
 
PPTX
Introduction to Cryptography
Md. Afif Al Mamun
 
PDF
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
Vivek Maurya
 
PPTX
Cryptography and network security
patisa
 
PPTX
Cryptography
Jens Patel
 
PPTX
Cryptography
Darshini Parikh
 
PPTX
Cryptography
Sagar Janagonda
 
Cryptography
Sidharth Mohapatra
 
Cryptography.ppt
kusum sharma
 
Introduction to Cryptography
Md. Afif Al Mamun
 
System modeling and simulation full notes by sushma shetty (www.vtulife.com)
Vivek Maurya
 
Cryptography and network security
patisa
 
Cryptography
Jens Patel
 
Cryptography
Darshini Parikh
 
Cryptography
Sagar Janagonda
 

What's hot (20)

PPTX
Cryptography
subodh pawar
 
PPT
PGP S/MIME
Sou Jana
 
PPT
Cryptography ppt
Anubhav Sokhal
 
PDF
Introduction to Cryptography
Seema Goel
 
PPT
Cryptography Intro
Christopher Martin
 
PPTX
Cryptography
Pratiksha Patil
 
PPTX
Cryptography.ppt
Uday Meena
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PDF
Introduction to Cryptography
Popescu Petre
 
PPTX
Cryptography
Rutuja Solkar
 
PPT
Cryptography
IGZ Software house
 
PPTX
Cryptography
EmaSushan
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPT
6. cryptography
7wounders
 
PPTX
Cryptanalysis
Sou Jana
 
PPTX
Symmetric and asymmetric key
Triad Square InfoSec
 
PPT
Cryptography
gueste4c97e
 
PDF
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Cryptography
subodh pawar
 
PGP S/MIME
Sou Jana
 
Cryptography ppt
Anubhav Sokhal
 
Introduction to Cryptography
Seema Goel
 
Cryptography Intro
Christopher Martin
 
Cryptography
Pratiksha Patil
 
Cryptography.ppt
Uday Meena
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Introduction to Cryptography
Popescu Petre
 
Cryptography
Rutuja Solkar
 
Cryptography
IGZ Software house
 
Cryptography
EmaSushan
 
Cryptography and Network Security
Pa Van Tanku
 
6. cryptography
7wounders
 
Cryptanalysis
Sou Jana
 
Symmetric and asymmetric key
Triad Square InfoSec
 
Cryptography
gueste4c97e
 
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Ad

Similar to cryptography (20)

PPTX
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
PDF
CyberGhost VPN Encryption Guide
CyberGhost VPN
 
PDF
Computer Security Chapter III.pdf
Harrisentertainment
 
PPTX
Cryptography
AnandKaGe
 
PPTX
cryptography presentation this about how cryptography works
vimalguptaofficial
 
PDF
Crypto_Artemis Final oooo Presentation.pdf
ferar27708
 
PDF
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
 
DOC
Cryptography saurabh
SaurabhChakraverty1
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PDF
How encryption works
Mariko Saitoh
 
PPTX
Cryptography
Kural Amudhan
 
PPTX
Cryptography
Suraj Shukla
 
PPTX
Advanced cryptography and implementation
Akash Jadhav
 
PPTX
Cryptography
Jasim Jas
 
PDF
Data Security on Computer Network and Telecommunication System Using Caesar C...
Yekini Nureni
 
PPT
Information Cryptography Security
Achmad Solichin
 
PPT
Cryptography and E-Commerce
Hiep Luong
 
PPSX
Overview Of Cryptography
Manjarul Hoque
 
PPTX
Cryptography
Birmingham City University
 
PPTX
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
CyberGhost VPN Encryption Guide
CyberGhost VPN
 
Computer Security Chapter III.pdf
Harrisentertainment
 
Cryptography
AnandKaGe
 
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Crypto_Artemis Final oooo Presentation.pdf
ferar27708
 
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
 
Cryptography saurabh
SaurabhChakraverty1
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
How encryption works
Mariko Saitoh
 
Cryptography
Kural Amudhan
 
Cryptography
Suraj Shukla
 
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography
Jasim Jas
 
Data Security on Computer Network and Telecommunication System Using Caesar C...
Yekini Nureni
 
Information Cryptography Security
Achmad Solichin
 
Cryptography and E-Commerce
Hiep Luong
 
Overview Of Cryptography
Manjarul Hoque
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Ad

Recently uploaded (20)

PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
The Future of Artificial Intelligence (AI)
Mukul
 
Software Development Methodologies in 2025
KodekX
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 

cryptography

  • 2. What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, and authentication.
  • 4. HISTORY OF CRYPTOGRAPHY THE ORIGIN OF CRYPTOGRAPHY TOOK PLCAE AROUND 2000 B.C. IN EGYPT. Before the modern era, cryptography was concerned solely with message confidentiality (i.e., Encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge. Encryption was used to ensure secrecy in communications, such as those of spies, military leaders, and diplomats.
  • 5. CLASSIC CRYPTOGRAPHY The main classical cipher types are transposition ciphers, which rearrange the order of letters in a message and substitution ciphers, which symmetrically replace letters with other letters. EXAMPLE., ‘hello world’ becomes 'ehlol owrdl' in a trivially simple rearrangement scheme. A cipher (or cypher) is an algorithm for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure.
  • 6. An early substitution cipher was the Caesar cipher, in which each letter in the plain text was replaced by a letter some fixed number of positions further down the alphabet. Suetonius reports that Julius Caesar used it with a shift of three to communicate with his generals. Reconstructed ancient Greek scytale (rhymes with "Italy"), an early cipher device.
  • 9. THE COMPUTER ERA OR MODERN CRYPTOGRAPHY
  • 10. • The development of digital computers and electronics after WWII made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data represent able in any binary format, unlike classical ciphers which only encrypted written language texts; this was new and significant. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages.
  • 11. •These days a fine example of cryptography is Credit card with smart-card capabilities. The 3-by-5-mm chip embedded in the card is shown, enlarged. Smart cards combine low cost and portability with the power to compute cryptographic algorithms
  • 12. Padlock icon from the Firefox Web browser, meant to indicate a page has been sent in SSL or TLS-encrypted protected form. However, seeing an icon results when code is intended to render it. Malicious code can provide the icon even when the connection is not actually being protected by SSL or TLS
  • 14. The mod e r n f ie ld o f c rypt ogra phy c a n be d ivid e d in t o s e ve r a l a r e a s o f s t u d y : SYMMETRIC KEY CRYPTOGRAPHY : Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key PUBLIC KEY CRYTOGRAPHY : Public key cryptography refers to encryption methods in which both the sender and receiver share the different keys. The basic elements of cryptography are: 1. Encryption 2. Decryption 3. Key
  • 16. The above example was of symmetric key cryptography. Here we can see the difference between PUBLIC and PRIVATE key
  • 17. •The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are block cipher designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted).
  • 19. APPLICATIONS OF CRYPTOGRAPHY • ATM • e-mail • Secure remote access • ISDN • PEM • PGD • Smart Cards and many more