Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext.

kalojo7178 19 views 19 slides May 03, 2024
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Cryptography is the art and science of securing communication and data by converting plain text into unintelligible ciphertext. It's an essential aspect of cybersecurity and privacy, used in various fields such as finance, government, military, and everyday online communication.

At its core, cr...


Slide Content

Cybersecurity Hands-on Workshop 2024

Cryptography: Turning digital secrets into virtual puzzles, where only the ones with the magic keys can unlock the treasure chest of information!

Cryptography is essential for cybersecurity, ensuring the confidentiality, integrity, and authenticity of digital data. It protects data from unauthorized access, verifies identities in digital transactions, and ensures the integrity of information through techniques like encryption, digital signatures, and authentication protocols. Importance

Types of Cryptography: Symmetric Cryptography: Symmetric cryptography uses a single shared key for both encryption and decryption. The sender encrypts the plaintext using the shared key to produce ciphertext, and the recipient decrypts the ciphertext using the same key to recover the plaintext. Asymmetric Cryptography: Asymmetric cryptography uses a pair of keys (public and private) for encryption and decryption. The sender encrypts the plaintext using the recipient's public key, and the recipient decrypts the ciphertext using their private key.

Secret cryptographic key known only to its owner. Used for decryption and digital signing. Must be kept confidential and secure. Paired with private key in asymmetric cryptography. Freely distributed to others. Used for encryption and verifying digital signatures.

Hash Functions Hash functions take an input (like a message or data) and convert it into a fixed-size string of characters. Hash functions have two main properties: they always produce the same output for the same input (deterministic), and it's very hard to generate the same output with different inputs (collision resistance).

Common Cryptographic Algorithms

AES (Advanced Encryption Standard) : The Advanced Encryption Standard (AES) is  a symmetric key encryption algorithm that uses the same key for encryption and decryption .  AES is known for its strong security and efficiency. It supports key sizes of 128, 192, or 256 bits

RSA (Rivest-Shamir- Adleman ) : Rivest-Shamir- Adleman (RSA) is  a public-key cryptographic algorithm that protects sensitive data by encrypting and decrypting it using a private and public key pair . 

SHA (Secure Hash Algorithm) : SHA encryptions are used for a variety of methods including to hash data, certificate files, and other cryptographic purposes including in cryptocurrencies like bitcoin.

Cryptographic Protocols SSL/TLS (Secure Sockets Layer/Transport Layer Security ): SSL/TLS protocols secure internet communication by encrypting data, authenticating parties, and ensuring data integrity . Web browsing, email, file transfer, remote access.

d Code

CyberChef