This document provides an overview of cryptography. It discusses the history of cryptography, noting its first uses in ancient Egypt. It then breaks down cryptography, explaining the two main types: symmetric cryptography which uses the same key for encryption and decryption, and asymmetric cryptography which uses different public and private keys. The document notes that asymmetric cryptography was invented to solve key management problems with symmetric cryptography. It provides examples of how each system works and includes a short quiz to test the reader's understanding.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
146 views
CRYPTOGRAPHY1
This document provides an overview of cryptography. It discusses the history of cryptography, noting its first uses in ancient Egypt. It then breaks down cryptography, explaining the two main types: symmetric cryptography which uses the same key for encryption and decryption, and asymmetric cryptography which uses different public and private keys. The document notes that asymmetric cryptography was invented to solve key management problems with symmetric cryptography. It provides examples of how each system works and includes a short quiz to test the reader's understanding.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
by Aravind
CRYPTOGRAPHY Brief History of Cryptography!!!! What is Cryptography?
Science of writing secret code
The first use of cryptography in 1900 B.C.
1. Used by Egyptian scribe
2. Some experts say it appeared right
after writing was invented Cryptography Broken Down!!! Two kinds of cryptosystems:
Symmetric
Uses the same key (the secret key) to encrypt
and decrypt a message. Asymmetric
Uses one key (the public key) to encrypt a
message and a different key (the private key) to decrypt the message. Symmetric Cryptosystem! The message:
The sender and receiver know and use the
same secret key.
The sender uses the secret key to encrypt
the message.
The receiver uses the same secret key to
decrypt the message. Symmetric Challenge! Main challenge:
Agreeing on the key while maintaining
secrecy.
Trusting a phone system or some
transmission medium.
The interceptor can read, modify, and
forge all messages Key Management!!! Key management:
The generation, transmission, and storage of a key.
All cryptosystems must deal with key
management issues
Because all keys must remain secret there is
often difficulty providing secure key management. Introduction of the Public Key!!! Created to solve key management problems.
Created by Whitfield Diffie and Martin Hellman in 1976.
Also called asymmetric system.
Encryption key: public key
Decryption key: private key
How its works!!!! Lets see some examples!!!! Click here to experiment with different encryption methods. http://www.cs.usask.ca/resources/tutoria ls/csconcepts/1999_3/lessons/L3/Simple Encryption.html A Little Quiz to Test What You Learned!!! 1.)What are the two different types of cryptosystems? 2.)What is the difference between the two systems? 3.) Which system was created as a result of difficulties of the other? What was the difficulty? Your Grade!!! Everyone Passed!!!!!
Thanks for your attention and
participation!!!!!! Bibliography!!!! Cryptography World. 2002. http://www.cryptographyworld.com/index.htm Kessler, Gary. An Overview of Cryptography. May 1998. http://www.garykessler.net/library/crypto.html Litterio, Francis. Cryptography. http://world.std.com/~franl/crypto.html RSA Laboratories. 2004. http://www.rsasecurity.com/rsalabs/node.asp?id=21 55