Cryptography introduction and its techniques

karunyar3715 117 views 15 slides Sep 16, 2024
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

This presentation provides a clear explanation of cryptography and its techniques. It will also cover the various keys used in cryptography, the types of attacks that can occur, and explain hash functions with clear examples


Slide Content

CRYPTOGRAPHY SUBMITTED BY R.KARUNYA Aristo Programmers Team Mother Teresa Women’s University, Kodaikanal

INTERNET COMMUNICATION

WHAT IS CRYPTOGRAPHY? CRYPTO – HIDDEN/SECRET GRAPHY-WRITE Cryptography means secret writing. In cryptography the structure of the data is modified. cryptography uses mathematical algorithms to prevent data from unauthorized persons.

COMPONENTS Plaintext Original text. Ciphertext The encrypted, or unreadable, version of the plaintext information. Encryption algorithm  The mathematical algorithm that takes plaintext as the input and encrypts to ciphertext. It also produces the unique encryption key for that text. Decryption algorithm The mathematical algorithm that takes ciphertext as the input and decodes it into plaintext. It also uses the unique decryption key for that text. Encryption key The value known to the sender that is used to compute the ciphertext for the given plaintext. Decryption key.   The value known to the receiver that is used to decode the given ciphertext into plaintext.

CRYPTO SYSTEM

TYPES OF ATTACKS

KEYS

TYPES OF CRYPTOGRAPHY

SYMMETRIC ENCRYPTION

ASYMMETRIC ENCRYPTION

HASH FUNCTION A hash function is a mathematical function that converts a numerical input value into another compressed numerical value. It takes inputs of variable lengths to return output of a fixed lengths. APPLICATION: Password Hashing : A password is a secret series of character that one uses to gain access to a document, an application or a computer system.

CLASSICAL ENCRYPTION TECHNIQUES SUBSITUTION The identity changes while its position does not change. Simple process. Easy to crack the code. Unauthorized users can easily access the data. The time complexity of encryption and decryption is less. “JUMP” will be turned “MXPS” J K L M N O P Q R S T U V W X TRANSPOSITION It scrambles the character’s position. Complex process. Difficult to crack the code. Difficult for intruders to access the data. The time complexity of encryption and decryption is less.