Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy m...
Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. The prefix “crypt” means “hidden” and suffix graphy means “writing”.
created by,
Nitish V
Size: 1.51 MB
Language: en
Added: Nov 03, 2019
Slides: 26 pages
Slide Content
CRYPTOGRAPHY An Introduction to Cryptographic Algorithms BY NITISH.V NAH SOLUTIONS
WHAT IS cryptography ? Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called attacker.
Let’s say there’s a person named Andy . Now suppose Andy sends a message to his friend Sam who is on the other side of the world. Now obviously he wants this message to be private and nobody else should have access to the message. He uses a public forum, for example, WhatsApp for sending this message. The main goal is to secure this communication.
Process of encryption and decryption
Another example
Encryption Algorithms
Symmetric key Cryptography An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. The most popular symmetric–key system is the Data Encryption Standard (DES)
Example of Symmetric Key Cryptography
Transposition Ciphers
Substitution Cipher or Caesar cipher Method of encryption by which units of plaintext are replaced with ciphertext, according to a fixed system; the “units” may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.
Block Cipher An encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers
Asymmetric Key Encryption (or Public Key Cryptography) The encryption process where different keys are used for encrypting and decrypting the information. Keys are different but are mathematically related, such that retrieving the plain text by decrypting ciphertext is feasible.
Example of Asymmetric Key Encryption
http vs https
symmetric Key Encryption vs Asymmetric Key Encryption
RSA Algorithm (public key and private key) RSA stands for Rivest , Shamir, and Adelman , inventors of this technique Both public and private key are interchangeable Variable Key Size (512, 1024, or 2048 bits)
Formula of RSA Algorithm
What is Tokenization ? Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value.
How Tokenization work’s
Jwt (JSON Web tokens) JSON Web Token (JWT) is an open standard ( RFC 7519 ) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.
Json objects example
When should you use JSON Web Tokens
Bearer Authorization In authentication, when the user successfully logs in using their credentials, a JSON Web Token will be returned. Whenever the user wants to access a protected route or resource, the user agent should send the JWT, typically in the Authorization header using the Bearer schema.
Thank You Contact : [email protected] www.myniuna.co.in +91-6379719176