SlideShare a Scribd company logo
Presented By : Shibani Sarangi
IT Branch, Regd no. 1001289324
Guided By : Prof. X
1
2
Cryptography
Vocabulary
Encryption &
Decryption
Transmission
Technique
Symmetric
Cryptography
Asymmetric
Cryptography
3
Cryptography is the science of using
mathematics to encrypt and decrypt data.
Cryptography enables you to store
sensitive information or transmit it across
insecure networks so that it cannot be
read by anyone except the intended
recipient.
4
Plaintext: Data that can be read and
understood without any special measures.
Encryption: The method of disguising
plaintext in such a way as to hide its
substance is called encryption.
Cipher text: Encrypting plaintext results in
unreadable gibberish called cipher text.
Decryption: The process of reverting
cipher text to its original plaintext is called
decryption.
Key: some secret piece of information
5
Cryptanalysis: The art of breaking
ciphers, i.e. retrieving the plaintext without
knowing the proper key.
Cryptographers: People who do
cryptography
Cryptanalysts: Practitioners of
cryptanalysis.
Cryptology: The branch of mathematics
that studies the mathematical foundations
of cryptographic methods.
6
7
For “secret writing”
To establish a shared secret when other
people (eavesdroppers) are listening.
TYPES
Mainly classified into two types :
1. Symmetric key cryptography
2. Asymmetric key cryptography
8
encoder
decoder
(plaintext in -
ciphertext out)
ciphertextciphertext
msgmsg
(ciphertext in
- plaintext out)
(should understand
nothingnothing about the msg)
eavesdropper
bla-blabla-bla
cmbcmb--cmbcmb bla-blabla-bla
Cipher
msg
Plain text – in
Cipher text - out
Should understand NOTHING
about the message
Cipher text – in
Plain text - out
Cryptography
Symmetric key Asymmetric key
cryptography cryptography
(Public key cryptography)
Classical Modern
cryptography cryptography
Transposition Substitution Stream Block
cipher cipher cipher cipher
9
BOTH SHOULD
KNOWTHE KEY
10
11
In classical cryptography, a transposition
cipher changes one character from the
plaintext to another i.e. the order of the
characters is changed.
12
Substitution cipher is a method of
encryption by which units of plaintext are
substituted with ciphertext according to a
regular system.
13
A Stream Cipher is a symmetric or secret-
key encryption algorithm that encrypts a
single bit at a time. With a Stream Cipher, the
same plaintext bit or byte will encrypt to a
different bit or byte every time it is encrypted.
e.g. :
Plain text: Pay 100
Binary of plain text: 010111101
(hypothetical)
Key: 100101011 -----
Perform XOR
____________________
Cipher text 110010110 -----
14
Block cipher technique involves encryption
of one block of text at a time .Decryption also
takes one block of encrypted text at a time.
Length of the block is usually 64 or 128 bits.
e.g. :
Plain text: four and five
Four and five
Key Key Key
wvfa ast wvfa ---
15
Public key cryptography is an asymmetric
scheme that uses a Pair of keys for
encryption: a Public key, which encrypts
data, and a corresponding Private key (secret
key) for decryption.
16
Cryptanalysis refers to the study of
ciphers, cipher text, or cryptosystems (that
is, to secret code systems) with a view to
finding weaknesses in them that will permit
retrieval of the plain text from the cipher
text, without necessarily knowing
the key or the algorithm. This is known
as breaking the cipher, cipher text, or
cryptosystem.
Unlike cryptography which is a clearly
17
Known - plain text analysis
Chosen – plain text analysis (Differential
cryptanalysis)
Cipher text - only analysis
Man – in – the - middle attack
18
It is a side channel attack which exploits
sounds emitted by computers or machines.
Modern acoustic cryptanalysis mostly focuses
on sounds emitted by computer keyboards and
internal computer components
Historically it has also been applied to impact
printers and electromechanical cipher machines.
19
Use rubber keyboard or virtual keyboards
to prevent keystroke sounds.
Use acoustic printers.
Use Acoustic case for CPU.
20
Cryptography, being an art of encrypting
and decrypting confidential information and
private messages, should be implemented in
the network security to prevent any leakage
and threat.
It can be done by using any of these
techniques discussed above for fortifying the
personal data transmission as well as for
secure transaction.
Acoustic cryptanalysis, being an art of
Yang, Sarah (14 September
2005), "Researchers recover typed text using
audio recording of keystrokes", UC Berkeley
News.
Adi Shamir & Eran Tromer. "Acoustic
cryptanalysis". Blavatnik School of Computer
Science, Tel Aviv University. Retrieved 1
November 2011.
http://en.wikipedia.org/wiki/Cryptography
21
22
Ad

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
OECLIB Odisha Electronics Control Library
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Cryptography
CryptographyCryptography
Cryptography
prasham95
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
vinitha96
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 

Viewers also liked (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Certification authority
Certification   authorityCertification   authority
Certification authority
proser tech
 
Steganography
SteganographySteganography
Steganography
Mayank Saxena
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
Shafaan Khaliq Bhatti
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Steganography
SteganographySteganography
Steganography
Neha Sharma
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
types of network
types of networktypes of network
types of network
Zenobia Sukhia
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
هيثم فرج
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
nayakslideshare
 
Aes
AesAes
Aes
Kunal Prajapati
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Amir Masinaei
 
cns 2marks
cns 2markscns 2marks
cns 2marks
ilakiyadinesh
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Popescu Petre
 
Certification authority
Certification   authorityCertification   authority
Certification authority
proser tech
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Online
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Amir Masinaei
 
Ad

Similar to Cryptography (20)

Cryptography
CryptographyCryptography
Cryptography
Shafique Rehman
 
Pavan
PavanPavan
Pavan
pavan kumar
 
Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)
Vidyadhar Vijju
 
Crpto ppt
Crpto pptCrpto ppt
Crpto ppt
Asmita Pal
 
Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02
Ravi Kashyap
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
amiteshg
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Chapter-Three Part One.pptxghgjhhjghjhjhhjChapter-Three Part One.pptxghgjhhjghjhjhhj
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Shemse Shukre
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro1
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...
researchcollabarator
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
SaurabhChakraverty1
 
Day5
Day5Day5
Day5
Jai4uk
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
Ali Habeeb
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
Cyber security Unit 3 Cryptography and Network security
Cyber security Unit 3  Cryptography and Network securityCyber security Unit 3  Cryptography and Network security
Cyber security Unit 3 Cryptography and Network security
eticket4403
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)
Vidyadhar Vijju
 
Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02Cryptography 130919084510-phpapp02
Cryptography 130919084510-phpapp02
Ravi Kashyap
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
amiteshg
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab KumbhakarCryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Chapter-Three Part One.pptxghgjhhjghjhjhhjChapter-Three Part One.pptxghgjhhjghjhjhhj
Chapter-Three Part One.pptxghgjhhjghjhjhhj
Shemse Shukre
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro1
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...
researchcollabarator
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
Cyber security Unit 3 Cryptography and Network security
Cyber security Unit 3  Cryptography and Network securityCyber security Unit 3  Cryptography and Network security
Cyber security Unit 3 Cryptography and Network security
eticket4403
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
Joel Briza
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Ad

Recently uploaded (20)

Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
SPRING FESTIVITIES - UK AND USA -
SPRING FESTIVITIES - UK AND USA            -SPRING FESTIVITIES - UK AND USA            -
SPRING FESTIVITIES - UK AND USA -
Colégio Santa Teresinha
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 

Cryptography

  • 1. Presented By : Shibani Sarangi IT Branch, Regd no. 1001289324 Guided By : Prof. X 1
  • 3. 3 Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
  • 4. 4 Plaintext: Data that can be read and understood without any special measures. Encryption: The method of disguising plaintext in such a way as to hide its substance is called encryption. Cipher text: Encrypting plaintext results in unreadable gibberish called cipher text. Decryption: The process of reverting cipher text to its original plaintext is called decryption. Key: some secret piece of information
  • 5. 5 Cryptanalysis: The art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. Cryptographers: People who do cryptography Cryptanalysts: Practitioners of cryptanalysis. Cryptology: The branch of mathematics that studies the mathematical foundations of cryptographic methods.
  • 6. 6
  • 7. 7 For “secret writing” To establish a shared secret when other people (eavesdroppers) are listening. TYPES Mainly classified into two types : 1. Symmetric key cryptography 2. Asymmetric key cryptography
  • 8. 8 encoder decoder (plaintext in - ciphertext out) ciphertextciphertext msgmsg (ciphertext in - plaintext out) (should understand nothingnothing about the msg) eavesdropper bla-blabla-bla cmbcmb--cmbcmb bla-blabla-bla Cipher msg Plain text – in Cipher text - out Should understand NOTHING about the message Cipher text – in Plain text - out
  • 9. Cryptography Symmetric key Asymmetric key cryptography cryptography (Public key cryptography) Classical Modern cryptography cryptography Transposition Substitution Stream Block cipher cipher cipher cipher 9
  • 11. 11 In classical cryptography, a transposition cipher changes one character from the plaintext to another i.e. the order of the characters is changed.
  • 12. 12 Substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system.
  • 13. 13 A Stream Cipher is a symmetric or secret- key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher, the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted. e.g. : Plain text: Pay 100 Binary of plain text: 010111101 (hypothetical) Key: 100101011 ----- Perform XOR ____________________ Cipher text 110010110 -----
  • 14. 14 Block cipher technique involves encryption of one block of text at a time .Decryption also takes one block of encrypted text at a time. Length of the block is usually 64 or 128 bits. e.g. : Plain text: four and five Four and five Key Key Key wvfa ast wvfa ---
  • 15. 15 Public key cryptography is an asymmetric scheme that uses a Pair of keys for encryption: a Public key, which encrypts data, and a corresponding Private key (secret key) for decryption.
  • 16. 16 Cryptanalysis refers to the study of ciphers, cipher text, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plain text from the cipher text, without necessarily knowing the key or the algorithm. This is known as breaking the cipher, cipher text, or cryptosystem. Unlike cryptography which is a clearly
  • 17. 17 Known - plain text analysis Chosen – plain text analysis (Differential cryptanalysis) Cipher text - only analysis Man – in – the - middle attack
  • 18. 18 It is a side channel attack which exploits sounds emitted by computers or machines. Modern acoustic cryptanalysis mostly focuses on sounds emitted by computer keyboards and internal computer components Historically it has also been applied to impact printers and electromechanical cipher machines.
  • 19. 19 Use rubber keyboard or virtual keyboards to prevent keystroke sounds. Use acoustic printers. Use Acoustic case for CPU.
  • 20. 20 Cryptography, being an art of encrypting and decrypting confidential information and private messages, should be implemented in the network security to prevent any leakage and threat. It can be done by using any of these techniques discussed above for fortifying the personal data transmission as well as for secure transaction. Acoustic cryptanalysis, being an art of
  • 21. Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News. Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011. http://en.wikipedia.org/wiki/Cryptography 21
  • 22. 22