SlideShare a Scribd company logo
Cryptography โ€“
Encryption/Decryption
Cryptography
What is Cryptography?
      Cryptography derived its name from a
      Greek word called โ€œKryptosโ€ which
      means โ€œHidden Secretsโ€.

      Cryptography is the practice and study
      of hiding information. It is the Art or
      Science of converting a plain
      intelligible data into an unintelligible
      data and again retransforming that
      message into its original form.

      It provides
      Confidentiality, Integrity, Accuracy.
What is Encryption / Decryption

๏‚—   Encryption โ€“
    โ—ฆ The process of converting plain text into an
      unintelligible format (cipher text) is called
      Encryption.


๏‚—   Decryption โ€“
    โ—ฆ The process of converting cipher text into a plain
      text is called Decryption.
What are the Types of Cryptography
๏‚—   Symmetric Key Cryptography (Secret Key Cryptography)
    โ—ฆ Same Key is used by both parties
    Advantages
     1. Simpler and Faster

    Disadvantages
    1. Less Secured




Image taken from :-
www.google.com
๏‚—   Asymmetric Key Cryptography (Public Key Cryptography)
    โ—ฆ 2 different keys are used
    โ—ฆ Users get the Key from an Certificate Authority

    Advantages
    1. More Secured
    2. Authentication

    Disadvantages
    1. Relatively Complex




Image taken from :-
www.google.com
๏‚—   What is a Key
    โ—ฆ In cryptography, a key is a variable value that is applied
      using an algorithm to a string or block of unencrypted text
      to produce encrypted text, or to decrypt encrypted text.
      The length of the key is a factor in considering how
      difficult it will be to decrypt the text in a given message.

๏‚—   What is a Block Cipher?
    โ—ฆ A method of encrypting / decrypting data
    โ—ฆ Key is used for encryption / decryption.
    โ—ฆ Same size of I/P and O/P

๏‚—   What is Initialization Vector?
    โ—ฆ An initialization vector (IV) is an arbitrary number that can
      be used along with a secret key for data encryption.
    โ—ฆ It is a group of hex values.
๏‚—   What is DES?
    โ—ฆ The Data Encryption Standard (DES) is a previously predominant
      algorithm used for encryption/decryption of electronic data. DES
      was developed in the early 70โ€™s by IBM which was then submitted
      to the National Bureau of Standards (NBS).

    โ—ฆ Like other private key cryptographic methods, both the sender
      and the receiver must know and use the same private key.

    โ—ฆ DES uses a 56 bit encryption key which can give around 2^56 (ie)
      256 combinations to encrypt the plain text. DES is restricted with
      a Block Size of just 64bits.

    โ—ฆ Sometimes DES is said to use 64 bit key, but 8bits out of it is
      used for some other purpose.

    โ—ฆ The maximum amount that can be transferred with a single
      encryption is 32GB. DES uses the Feistel Network which divides
      block into 2 halves before going through the encryption steps.
๏‚—   What is AES?
    โ—ฆ The Advanced Encryption Standard (AES) is a specification for
      the Encryption of electronic data. Originally called โ€œRijndaelโ€ the
      cipher was developed by 2 Belgian Cryptographers โ€œJoan
      Daemenโ€ and โ€œVincent Rijmenโ€ who submitted to the AES
      Selection process held by the NIST (National Institute of
      Standards and Technology) in the year 1997 which continued for
      3 years and the end result was given on 2nd October 2002 where
      Rijndael was chosen as the proposed standard.

    โ—ฆ The algorithm described by AES is a Symmetric-Key
      Algorithm, meaning the same key is used for encrypting and
      decrypting the data. AES standard is a variant of Rijndael where
      the block size is restricted to 128bits and the key size of
      128, 192, 256 bits can be used.

    โ—ฆ AES is based on a design principle known as a substitution-
      permutation network, and is fast in both software and hardware.
DES Encryption                                      AES Encryption
DES uses only 56 bits key which provides a         AES can use 128, 192, 256 bits keys which
combination of 2^56 = 256 combinations for         provides 2^128, 2^192, 2^256 combinations for
encryption.                                        encryption.
DES is restricted to use a Block Size of only 64   AES is restricted to use a Block Size of 128 bits
bits                                               (double of what is used in DES)
With 64 bits block size, the amount of data that   With AES, it is possible to transfer around 256
can be transferred with a single encryption key    billion GB of data. It is probably safe to say that
is just 32GB.                                      you can use a single AES encryption key for
                                                   any application.
DES uses a Feistel network, which divides the      AES uses Permutation-Substitution method,
block into 2 halves before going through the       which involves a series of substitution and
Encryption steps.                                  permutation steps to create the encrypted
                                                   block.
DES encryption is breakable through Brute          AES encryption on the other hand is still not
Force attack.                                      breakable, though there are some theoretical
                                                   discussions about breaking the AES.
DES is an old technique used for                   AES is relatively new.
encryption/decryption
Time required to check all the possible keys at    Time required to check all the possible keys at
50 billion keys per second โ€“ For a 128-bit key:    50 billion keys per second โ€“ For a 56-bit key:
5x1021 years (which makes it difficult for the     400 days.
hackers to decrypt the data)
THANK YOU
Ad

More Related Content

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
ย 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
ย 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
ย 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
ย 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
ย 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
ย 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
ย 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
ย 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
ย 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
Anubhav Sokhal
ย 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
ย 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
ย 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
ย 
Network security
Network securityNetwork security
Network security
Gichelle Amon
ย 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
ย 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
ย 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
OECLIB Odisha Electronics Control Library
ย 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
ย 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
ย 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
ย 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
ย 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
ย 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
ย 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
ย 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
ย 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
ย 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
ย 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
Anubhav Sokhal
ย 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
ย 
Network security
Network securityNetwork security
Network security
Gichelle Amon
ย 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
ย 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
ย 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
ย 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
ย 
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
ย 

Viewers also liked (20)

Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
ย 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
Roman Oliynykov
ย 
E - governance
E - governanceE - governance
E - governance
Nishant Pahad
ย 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
Jitendra Tomar
ย 
E governance
E governanceE governance
E governance
Payel Ghosh
ย 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
ย 
types of network
types of networktypes of network
types of network
Zenobia Sukhia
ย 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
ย 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
Shelly
ย 
How does rotary heat machine work on fabric
How does rotary heat machine work on fabricHow does rotary heat machine work on fabric
How does rotary heat machine work on fabric
Fei Yue Paper Industrial Co.,Ltd.
ย 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sukhvir Sabharwal
ย 
Smartplug ppt
Smartplug pptSmartplug ppt
Smartplug ppt
Agniv Mukherjee
ย 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
Tim O'Reilly
ย 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
Sanaullah Shimul
ย 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
Anurag Chaudhary
ย 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
ย 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
Snehil Rastogi
ย 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
ESCOM
ย 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
ย 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
Orange Slides
ย 
Next generation block ciphers
Next generation block ciphersNext generation block ciphers
Next generation block ciphers
Roman Oliynykov
ย 
E - governance
E - governanceE - governance
E - governance
Nishant Pahad
ย 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
Jitendra Tomar
ย 
E governance
E governanceE governance
E governance
Payel Ghosh
ย 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
ย 
types of network
types of networktypes of network
types of network
Zenobia Sukhia
ย 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
Amit Shaw
ย 
Ppt's of e governance
Ppt's of e governancePpt's of e governance
Ppt's of e governance
Shelly
ย 
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir SabharwalSublimation vs Digital Printing By Sukhvir Sabharwal
Sublimation vs Digital Printing By Sukhvir Sabharwal
Sukhvir Sabharwal
ย 
Lessons from Software for Synthetic Biology
Lessons from Software for Synthetic BiologyLessons from Software for Synthetic Biology
Lessons from Software for Synthetic Biology
Tim O'Reilly
ย 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
Sanaullah Shimul
ย 
Virtual manufacturing
Virtual manufacturingVirtual manufacturing
Virtual manufacturing
Anurag Chaudhary
ย 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
ย 
Analysis and applications of artificial neural networks
Analysis and applications of artificial neural networksAnalysis and applications of artificial neural networks
Analysis and applications of artificial neural networks
Snehil Rastogi
ย 
NEURAL Network Design Training
NEURAL Network Design  TrainingNEURAL Network Design  Training
NEURAL Network Design Training
ESCOM
ย 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
ย 
Micromachining Technology Seminar Presentation
Micromachining Technology Seminar PresentationMicromachining Technology Seminar Presentation
Micromachining Technology Seminar Presentation
Orange Slides
ย 
Ad

Similar to Cryptography (20)

Cryptography
Cryptography Cryptography
Cryptography
Shankar Ghorpade
ย 
Cryptography
CryptographyCryptography
Cryptography
Shankar Ghorpade
ย 
82 86
82 8682 86
82 86
Editor IJARCET
ย 
82 86
82 8682 86
82 86
Editor IJARCET
ย 
Encryption
EncryptionEncryption
Encryption
IGZ Software house
ย 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing1
ย 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
ย 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
ย 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
ย 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
ย 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Dharani675311
ย 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
ย 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
ย 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
ย 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
ย 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
ย 
AES Abstract
AES AbstractAES Abstract
AES Abstract
SathrukaSinha
ย 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
ย 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
ย 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
ย 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing1
ย 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
ย 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
ย 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
ย 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
ย 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Dharani675311
ย 
Basic Cryptography.pdf
Basic Cryptography.pdfBasic Cryptography.pdf
Basic Cryptography.pdf
Setiya Nugroho
ย 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
ย 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
ย 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
ย 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
ย 
AES Abstract
AES AbstractAES Abstract
AES Abstract
SathrukaSinha
ย 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
ย 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
ย 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
ย 
Ad

Recently uploaded (20)

Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
ย 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
ย 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
ย 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
ย 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
ย 
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy ConsumptionDrupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Exove
ย 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
ย 
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
ย 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
ย 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
ย 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
ย 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
ย 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
ย 
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy ConsumptionDrupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Drupalcamp Finland โ€“ Measuring Front-end Energy Consumption
Exove
ย 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
ย 
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything โ€“ Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
ย 

Cryptography

  • 3. What is Cryptography? Cryptography derived its name from a Greek word called โ€œKryptosโ€ which means โ€œHidden Secretsโ€. Cryptography is the practice and study of hiding information. It is the Art or Science of converting a plain intelligible data into an unintelligible data and again retransforming that message into its original form. It provides Confidentiality, Integrity, Accuracy.
  • 4. What is Encryption / Decryption ๏‚— Encryption โ€“ โ—ฆ The process of converting plain text into an unintelligible format (cipher text) is called Encryption. ๏‚— Decryption โ€“ โ—ฆ The process of converting cipher text into a plain text is called Decryption.
  • 5. What are the Types of Cryptography ๏‚— Symmetric Key Cryptography (Secret Key Cryptography) โ—ฆ Same Key is used by both parties Advantages 1. Simpler and Faster Disadvantages 1. Less Secured Image taken from :- www.google.com
  • 6. ๏‚— Asymmetric Key Cryptography (Public Key Cryptography) โ—ฆ 2 different keys are used โ—ฆ Users get the Key from an Certificate Authority Advantages 1. More Secured 2. Authentication Disadvantages 1. Relatively Complex Image taken from :- www.google.com
  • 7. ๏‚— What is a Key โ—ฆ In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. The length of the key is a factor in considering how difficult it will be to decrypt the text in a given message. ๏‚— What is a Block Cipher? โ—ฆ A method of encrypting / decrypting data โ—ฆ Key is used for encryption / decryption. โ—ฆ Same size of I/P and O/P ๏‚— What is Initialization Vector? โ—ฆ An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption. โ—ฆ It is a group of hex values.
  • 8. ๏‚— What is DES? โ—ฆ The Data Encryption Standard (DES) is a previously predominant algorithm used for encryption/decryption of electronic data. DES was developed in the early 70โ€™s by IBM which was then submitted to the National Bureau of Standards (NBS). โ—ฆ Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key. โ—ฆ DES uses a 56 bit encryption key which can give around 2^56 (ie) 256 combinations to encrypt the plain text. DES is restricted with a Block Size of just 64bits. โ—ฆ Sometimes DES is said to use 64 bit key, but 8bits out of it is used for some other purpose. โ—ฆ The maximum amount that can be transferred with a single encryption is 32GB. DES uses the Feistel Network which divides block into 2 halves before going through the encryption steps.
  • 9. ๏‚— What is AES? โ—ฆ The Advanced Encryption Standard (AES) is a specification for the Encryption of electronic data. Originally called โ€œRijndaelโ€ the cipher was developed by 2 Belgian Cryptographers โ€œJoan Daemenโ€ and โ€œVincent Rijmenโ€ who submitted to the AES Selection process held by the NIST (National Institute of Standards and Technology) in the year 1997 which continued for 3 years and the end result was given on 2nd October 2002 where Rijndael was chosen as the proposed standard. โ—ฆ The algorithm described by AES is a Symmetric-Key Algorithm, meaning the same key is used for encrypting and decrypting the data. AES standard is a variant of Rijndael where the block size is restricted to 128bits and the key size of 128, 192, 256 bits can be used. โ—ฆ AES is based on a design principle known as a substitution- permutation network, and is fast in both software and hardware.
  • 10. DES Encryption AES Encryption DES uses only 56 bits key which provides a AES can use 128, 192, 256 bits keys which combination of 2^56 = 256 combinations for provides 2^128, 2^192, 2^256 combinations for encryption. encryption. DES is restricted to use a Block Size of only 64 AES is restricted to use a Block Size of 128 bits bits (double of what is used in DES) With 64 bits block size, the amount of data that With AES, it is possible to transfer around 256 can be transferred with a single encryption key billion GB of data. It is probably safe to say that is just 32GB. you can use a single AES encryption key for any application. DES uses a Feistel network, which divides the AES uses Permutation-Substitution method, block into 2 halves before going through the which involves a series of substitution and Encryption steps. permutation steps to create the encrypted block. DES encryption is breakable through Brute AES encryption on the other hand is still not Force attack. breakable, though there are some theoretical discussions about breaking the AES. DES is an old technique used for AES is relatively new. encryption/decryption Time required to check all the possible keys at Time required to check all the possible keys at 50 billion keys per second โ€“ For a 128-bit key: 50 billion keys per second โ€“ For a 56-bit key: 5x1021 years (which makes it difficult for the 400 days. hackers to decrypt the data)