cryptography and network security

nitishV3 57 views 26 slides Nov 03, 2019
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy m...


Slide Content

CRYPTOGRAPHY  An Introduction to Cryptographic Algorithms BY NITISH.V NAH SOLUTIONS

WHAT IS cryptography ? Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called attacker.

Let’s say there’s a person named  Andy . Now suppose  Andy  sends a message to his friend  Sam  who is on the other side of the world. Now obviously he wants this message to be private and nobody else should have access to the message. He uses a public forum, for example, WhatsApp for sending this message. The main goal is to secure this communication.

Process of encryption and decryption

Another example

Encryption Algorithms

Symmetric key Cryptography An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. The most popular symmetric–key system is the Data Encryption Standard (DES)

Example of Symmetric Key Cryptography

Transposition Ciphers

Substitution Cipher or Caesar cipher  Method of encryption by which units of plaintext are replaced with ciphertext, according to a fixed system; the “units” may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. 

Block Cipher  An encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers 

Asymmetric Key Encryption (or Public Key Cryptography) The encryption process where different keys are used for encrypting and decrypting the information. Keys are different but are mathematically related, such that retrieving the plain text by decrypting ciphertext is feasible. 

Example of Asymmetric Key Encryption

http vs https

symmetric Key Encryption vs Asymmetric Key Encryption

RSA Algorithm (public key and private key) RSA stands for  Rivest , Shamir, and Adelman , inventors of this technique Both public and private key are interchangeable Variable Key Size (512, 1024, or 2048 bits)

Formula of RSA Algorithm

What is Tokenization ? Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. 

How Tokenization work’s

Jwt (JSON Web tokens) JSON Web Token (JWT) is an open standard ( RFC 7519 ) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

Json objects example

When should you use JSON Web Tokens

Bearer Authorization In authentication, when the user successfully logs in using their credentials, a JSON Web Token will be returned. Whenever the user wants to access a protected route or resource, the user agent should send the JWT, typically in the  Authorization  header using the  Bearer  schema. 

Thank You Contact : [email protected] www.myniuna.co.in +91-6379719176