0% found this document useful (0 votes)
146 views

CRYPTOGRAPHY1

This document provides an overview of cryptography. It discusses the history of cryptography, noting its first uses in ancient Egypt. It then breaks down cryptography, explaining the two main types: symmetric cryptography which uses the same key for encryption and decryption, and asymmetric cryptography which uses different public and private keys. The document notes that asymmetric cryptography was invented to solve key management problems with symmetric cryptography. It provides examples of how each system works and includes a short quiz to test the reader's understanding.

Uploaded by

Aravind Siva
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views

CRYPTOGRAPHY1

This document provides an overview of cryptography. It discusses the history of cryptography, noting its first uses in ancient Egypt. It then breaks down cryptography, explaining the two main types: symmetric cryptography which uses the same key for encryption and decryption, and asymmetric cryptography which uses different public and private keys. The document notes that asymmetric cryptography was invented to solve key management problems with symmetric cryptography. It provides examples of how each system works and includes a short quiz to test the reader's understanding.

Uploaded by

Aravind Siva
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

by Aravind

CRYPTOGRAPHY
Brief History of Cryptography!!!!
 What is Cryptography?

Science of writing secret code

 The first use of cryptography in 1900 B.C.

1. Used by Egyptian scribe

2. Some experts say it appeared right


after writing was invented
Cryptography Broken Down!!!
 Two kinds of cryptosystems:

Symmetric

Uses the same key (the secret key) to encrypt


and decrypt a message.
Asymmetric

Uses one key (the public key) to encrypt a


message and a different key (the private key) to
decrypt the message.
Symmetric Cryptosystem!
 The message:

The sender and receiver know and use the


same secret key.

The sender uses the secret key to encrypt


the message.

The receiver uses the same secret key to


decrypt the message.
Symmetric Challenge!
 Main challenge:

Agreeing on the key while maintaining


secrecy.

 Trusting a phone system or some


transmission medium.

 The interceptor can read, modify, and


forge all messages
Key Management!!!
 Key management:

The generation, transmission, and storage of a key.

 All cryptosystems must deal with key


management issues

 Because all keys must remain secret there is


often difficulty providing secure key
management.
Introduction of the Public Key!!!
 Created to solve key management problems.

 Created by Whitfield Diffie and Martin Hellman in 1976.

 Also called asymmetric system.

 Encryption key: public key

 Decryption key: private key


How its works!!!!
Lets see some examples!!!!
 Click here to experiment with different
encryption methods.
 http://www.cs.usask.ca/resources/tutoria
ls/csconcepts/1999_3/lessons/L3/Simple
Encryption.html
A Little Quiz to Test What You
Learned!!!
 1.)What are the two different types of
cryptosystems?
2.)What is the difference between the
two systems?
3.) Which system was created as a
result of difficulties of the other? What
was the difficulty?
Your Grade!!!
 Everyone Passed!!!!!

 Thanks for your attention and


participation!!!!!!
Bibliography!!!!
 Cryptography World. 2002.
http://www.cryptographyworld.com/index.htm
 Kessler, Gary. An Overview of Cryptography. May
1998. http://www.garykessler.net/library/crypto.html
 Litterio, Francis. Cryptography.
http://world.std.com/~franl/crypto.html
 RSA Laboratories. 2004.
http://www.rsasecurity.com/rsalabs/node.asp?id=21
55

You might also like