SlideShare a Scribd company logo
3
Most read
6
Most read
8
Most read
CRYPTOGRAPHY
CONTENTS
• What is Cryptography ?
• Types of Cryptographic Techniques
• Why Different Encryption Techniques ?
• Drawbacks of Classical Cryptography
• Need for New Techniques
• New Trends in Cryptography
• Conclusion
What is Cryptography ?
• Cryptography is the practice and study of hiding information.
• It is a branch of both mathematics and computer science , and is affiliated
  closely with information theory, computer security, and engineering.
• Cryptography is used in applications present in technologically advanced
  societies.
• Ex: ATM cards, computer passwords, and electronic commerce etc.
Types of Cryptographic Techniques
• They are categorized based on the number of keys that are employed for
  encryption and decryption.
• The three types are :-
   •   Secret Key Cryptography
   •   Public Key Cryptography
   •   Hash Functions
Secret Key Cryptography
• Secret-key Cryptography involves using the same key for encryption and
  decryption.




• Key used for Encryption must be as long as the message.
• The main disadvantages of Secret Key Cryptography is exchange of keys.
Public Key Cryptography
• Public-key cryptography requires two separate keys, one of which is secret
  and one of which is public.
• In this public key is used for encryption and private key is used for decryption.
Hash Functions
•It does not use any key for encryption.
•It uses a mathematical transformation to irreversibly "encrypt" information.
•Here the message is converted into a fixed length hash value.
Why Different Encryption
                 Techniques ?
•Hash Function are used for ensuring data integrity.
•Secret key cryptography is ideally suitable for encrypting messages.
•Public key cryptography is also used for encrypting messages but here different
keys are used for encryption and decryption, so it is more secured than secret
key cryptography.
Drawbacks of Classical
                   Cryptography
•Here the Encryption and Decryption Algorithms are publicly available.
•The privacy of the data transmission depends only on secrecy of a key.
•Thus if the key is revealed then the data can be compromised.
Need for new Techniques
•Today everything is on the internet.
•Thus Security plays a vital role in maintaining data.
•The older techniques are vulnerable to attacks .
•So to keep the data secure new techniques are required which are not
vulnerable.
New Trends in Cryptography
•The two new Technologies include :
 • Elliptic Curve Cryptography
 • Quantum Cryptography
 • Pairing based cryptography
Elliptic Curve Cryptography
Elliptic Curve Cryptography was proposed in 1985 by Victor Miller.
Two Points P and Q are given where Q is the public key.
Consider an integer n such that P=nQ .
An attacker might know P and Q but it is very difficult to find n which is the private key.
Quantum cryptography
It describes use of quantum mechanical effects to perform cryptographic tasks
Quantum communication to securely exchange a key
Quantum computers can only break into such encryption schemes
Pairing based cryptography
Pairs elements of two groups to construct a hybrid cryptographic system
Eg bilinear mapping
Using two or more vectors to yield a third vector to be used as key
CONCLUSION

More Related Content

PPTX
Introduction to Cryptography
Md. Afif Al Mamun
 
PPTX
Cyber Security Awareness
Innocent Korie
 
PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Artificial Intelligence(AI).
Md. Afif Al Mamun
 
PPTX
Cryptography.ppt
Uday Meena
 
PPTX
Cryptography
subodh pawar
 
PPT
block ciphers
Asad Ali
 
PPTX
Real analysis
Kalaiselviprakash
 
Introduction to Cryptography
Md. Afif Al Mamun
 
Cyber Security Awareness
Innocent Korie
 
Cryptography
Sidharth Mohapatra
 
Artificial Intelligence(AI).
Md. Afif Al Mamun
 
Cryptography.ppt
Uday Meena
 
Cryptography
subodh pawar
 
block ciphers
Asad Ali
 
Real analysis
Kalaiselviprakash
 

What's hot (20)

PPTX
Cryptography
jayashri kolekar
 
PPTX
Encryption ppt
Anil Neupane
 
PPT
Digital Signature
Mohamed Talaat
 
PPT
Encryption And Decryption
NA
 
PPTX
Cryptography and network security
patisa
 
ODP
Encryption presentation final
adrigee12
 
PPTX
Digital watermarking
Ankush Kr
 
PPTX
Digital signature(Cryptography)
Soham Kansodaria
 
PPTX
cryptography
Abhijeet Singh
 
PPTX
Security Mechanisms
priya_trehan
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPTX
Cryptography
Rutuja Solkar
 
PPTX
Data encryption
Deepam Goyal
 
PPTX
Cryptography.ppt
kusum sharma
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PDF
Asymmetric Cryptography
UTD Computer Security Group
 
PPT
Network security cryptography ppt
Thushara92
 
PPT
Digital signature
Hossain Md Shakhawat
 
Cryptography
jayashri kolekar
 
Encryption ppt
Anil Neupane
 
Digital Signature
Mohamed Talaat
 
Encryption And Decryption
NA
 
Cryptography and network security
patisa
 
Encryption presentation final
adrigee12
 
Digital watermarking
Ankush Kr
 
Digital signature(Cryptography)
Soham Kansodaria
 
cryptography
Abhijeet Singh
 
Security Mechanisms
priya_trehan
 
Cryptography and Network Security
Pa Van Tanku
 
Cryptography
Rutuja Solkar
 
Data encryption
Deepam Goyal
 
Cryptography.ppt
kusum sharma
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Asymmetric Cryptography
UTD Computer Security Group
 
Network security cryptography ppt
Thushara92
 
Digital signature
Hossain Md Shakhawat
 
Ad

Viewers also liked (20)

PPTX
Cryptography
herrberk
 
PPT
Cryptography
gueste4c97e
 
DOC
Cryptography full report
harpoo123143
 
PPTX
Cryptography
Shivanand Arur
 
PPT
overview of cryptographic techniques
Shubham Jain
 
PPTX
Cryptography
Darshini Parikh
 
PPT
Network Security and Cryptography
Adam Reagan
 
PPTX
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
PPTX
Secret key cryptography
Prabhat Goel
 
PPTX
Navigating Electronic Signature Law In Florida
ClientSide
 
PDF
Classical cipher
Hoang Nguyen
 
DOC
Biometric technology
Dharmik
 
PDF
Modern Cryptography
James McGivern
 
PPTX
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
DOC
File transfer using cryptography techniques
miteshkumar82
 
PPTX
Multi modal biometric system
Aalaa Khattab
 
PPT
Cryptography - A Brief History
prasenjeetd
 
PDF
Computer Security Lecture 3: Classical Encryption Techniques 2
Mohamed Loey
 
PDF
Cryptanalysis Project Report
shahparin
 
PPT
History of cryptography
Farah Shaikh
 
Cryptography
herrberk
 
Cryptography
gueste4c97e
 
Cryptography full report
harpoo123143
 
Cryptography
Shivanand Arur
 
overview of cryptographic techniques
Shubham Jain
 
Cryptography
Darshini Parikh
 
Network Security and Cryptography
Adam Reagan
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
Secret key cryptography
Prabhat Goel
 
Navigating Electronic Signature Law In Florida
ClientSide
 
Classical cipher
Hoang Nguyen
 
Biometric technology
Dharmik
 
Modern Cryptography
James McGivern
 
Three Level Security System Using Image Based Aunthentication
Bro Jayaram
 
File transfer using cryptography techniques
miteshkumar82
 
Multi modal biometric system
Aalaa Khattab
 
Cryptography - A Brief History
prasenjeetd
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Mohamed Loey
 
Cryptanalysis Project Report
shahparin
 
History of cryptography
Farah Shaikh
 
Ad

Similar to Cryptography (20)

PPTX
Cryptography
Muhammad Shoaib Saleem
 
PDF
chapter 1-4.pdf
zerihunnana
 
PDF
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
PPTX
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
PPT
Cryptography cse,ru
Hossain Md Shakhawat
 
PPTX
Information and network security 31 public key cryptography
Vaibhav Khanna
 
PPT
Crytography
Anchal Kumar
 
DOCX
Cryptography : The Art of Secured Messaging
Sumit Satam
 
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
gstagra
 
PPTX
Cryptography, a science of secure writing
tahirilyas92
 
PPTX
Cryptography and network security
Mathan Gopal
 
PPTX
Cryptography and network security
Shanthi Mathan
 
PDF
Information Security 05- Encryption.pdfn
faiziikanwal47
 
PPT
CRYPTOGRAPHY
SHUBHA CHATURVEDI
 
PPTX
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
bismayabaliarsingh00
 
PPTX
Cryptography
Ravi Kumar Patel
 
PPTX
groupWork.pptx
KennedyKiplangat1
 
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
ThejasviniBoorla
 
PPTX
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 
chapter 1-4.pdf
zerihunnana
 
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
Cryptography cse,ru
Hossain Md Shakhawat
 
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Crytography
Anchal Kumar
 
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Detailed description about the concept of E Commerce UNIT IV.pptx
gstagra
 
Cryptography, a science of secure writing
tahirilyas92
 
Cryptography and network security
Mathan Gopal
 
Cryptography and network security
Shanthi Mathan
 
Information Security 05- Encryption.pdfn
faiziikanwal47
 
CRYPTOGRAPHY
SHUBHA CHATURVEDI
 
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
bismayabaliarsingh00
 
Cryptography
Ravi Kumar Patel
 
groupWork.pptx
KennedyKiplangat1
 
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
ThejasviniBoorla
 
CISSP - Chapter 3 - Cryptography
Karthikeyan Dhayalan
 

More from أحلام انصارى (20)

PPTX
Intention recognition for dynamic role exchange in haptic
أحلام انصارى
 
PPT
Noise Adaptive Training for Robust Automatic Speech Recognition
أحلام انصارى
 
PPTX
Human behaviour analysis based on New motion descriptor
أحلام انصارى
 
PPTX
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
أحلام انصارى
 
PDF
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
أحلام انصارى
 
PPTX
Security issues in cloud database
أحلام انصارى
 
PPTX
Html5 offers 5 times better ways to hijack the website
أحلام انصارى
 
PPTX
Honey pot in cloud computing
أحلام انصارى
 
PPT
grid authentication
أحلام انصارى
 
PPTX
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
PPT
Dos presentation by ahlam shakeel
أحلام انصارى
 
PPTX
Password craking techniques
أحلام انصارى
 
PPT
Operating system vulnerability and control
أحلام انصارى
 
PPT
Network ssecurity toolkit
أحلام انصارى
 
PPTX
Image forgery and security
أحلام انصارى
 
PPTX
Image based authentication
أحلام انصارى
 
PPTX
Website attack n defacement n its control measures
أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
أحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
أحلام انصارى
 
Human behaviour analysis based on New motion descriptor
أحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
أحلام انصارى
 
Security issues in cloud database
أحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
أحلام انصارى
 
Honey pot in cloud computing
أحلام انصارى
 
grid authentication
أحلام انصارى
 
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
Dos presentation by ahlam shakeel
أحلام انصارى
 
Password craking techniques
أحلام انصارى
 
Operating system vulnerability and control
أحلام انصارى
 
Network ssecurity toolkit
أحلام انصارى
 
Image forgery and security
أحلام انصارى
 
Image based authentication
أحلام انصارى
 
Website attack n defacement n its control measures
أحلام انصارى
 

Cryptography

  • 2. CONTENTS • What is Cryptography ? • Types of Cryptographic Techniques • Why Different Encryption Techniques ? • Drawbacks of Classical Cryptography • Need for New Techniques • New Trends in Cryptography • Conclusion
  • 3. What is Cryptography ? • Cryptography is the practice and study of hiding information. • It is a branch of both mathematics and computer science , and is affiliated closely with information theory, computer security, and engineering. • Cryptography is used in applications present in technologically advanced societies. • Ex: ATM cards, computer passwords, and electronic commerce etc.
  • 4. Types of Cryptographic Techniques • They are categorized based on the number of keys that are employed for encryption and decryption. • The three types are :- • Secret Key Cryptography • Public Key Cryptography • Hash Functions
  • 5. Secret Key Cryptography • Secret-key Cryptography involves using the same key for encryption and decryption. • Key used for Encryption must be as long as the message. • The main disadvantages of Secret Key Cryptography is exchange of keys.
  • 6. Public Key Cryptography • Public-key cryptography requires two separate keys, one of which is secret and one of which is public. • In this public key is used for encryption and private key is used for decryption.
  • 7. Hash Functions •It does not use any key for encryption. •It uses a mathematical transformation to irreversibly "encrypt" information. •Here the message is converted into a fixed length hash value.
  • 8. Why Different Encryption Techniques ? •Hash Function are used for ensuring data integrity. •Secret key cryptography is ideally suitable for encrypting messages. •Public key cryptography is also used for encrypting messages but here different keys are used for encryption and decryption, so it is more secured than secret key cryptography.
  • 9. Drawbacks of Classical Cryptography •Here the Encryption and Decryption Algorithms are publicly available. •The privacy of the data transmission depends only on secrecy of a key. •Thus if the key is revealed then the data can be compromised.
  • 10. Need for new Techniques •Today everything is on the internet. •Thus Security plays a vital role in maintaining data. •The older techniques are vulnerable to attacks . •So to keep the data secure new techniques are required which are not vulnerable.
  • 11. New Trends in Cryptography •The two new Technologies include : • Elliptic Curve Cryptography • Quantum Cryptography • Pairing based cryptography
  • 12. Elliptic Curve Cryptography Elliptic Curve Cryptography was proposed in 1985 by Victor Miller. Two Points P and Q are given where Q is the public key. Consider an integer n such that P=nQ . An attacker might know P and Q but it is very difficult to find n which is the private key.
  • 13. Quantum cryptography It describes use of quantum mechanical effects to perform cryptographic tasks Quantum communication to securely exchange a key Quantum computers can only break into such encryption schemes
  • 14. Pairing based cryptography Pairs elements of two groups to construct a hybrid cryptographic system Eg bilinear mapping Using two or more vectors to yield a third vector to be used as key