Shreyansh-Singh PPT
Shreyansh-Singh PPT
Seminar Presentation
on
CRYPTOGRAPHY
Presented By:
Name – SHREYANSH SINGH
(Roll no. - 2021021073)
Email: [email protected]
Contents
• Introduction
• What is Cryptography?
• Purpose Of cryptography
• Architecture of cryptography
• Types of Cryptography
• Process of cryptography
• Types Of cryptography Algorithms
• Conclusion
• References
* Side 2
Madan Mohan Malaviya Univ. of Technology, Gorakhpur
INTRODUCTION
* Side 3
PURPOSE OF CRYPTOGRAPHY
Authentication: The process of proving one's identity. (The
primary forms of host-to-host authentication on the Internet
today are name-based or address-based, both of which are
notoriously weak.)
Privacy/confidentiality: Ensuring that no one can read the
message except the intended receiver.
Integrity: Assuring the receiver that the received message has
not been altered in any way from the original.
Non-repudiation: A mechanism to prove that the sender really
sent this message.
Architecture of cryptography
Types of Cryptography
One of the keys allocated to each person is called the "public key",
and is published in an open directory somewhere where anyone can
easily look it up, for example by email address.
Each entity has 2 keys:
Private Key (a secret)
Public key (well known).
Using Keys