SlideShare a Scribd company logo
Introduction to
Cryptography
Dr. Gururaj H L
Associate Professor
Dept.of IT
Manipal Institute of Technology, Bengaluru
1
2
Contents
• Introduction
• History
• Terminology
• Cryptography Methods
• Difference between Methods
• Application
3
Introduction
Cryptography:
Cryptography is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and
process it. Cryptography is closely related to the disciplines
of cryptology and cryptanalysis. Cryptography includes techniques such
as microdots, merging words with images, and other ways to hide
information in storage or transit.
4
German Lorenz cipher machine, used in World War II to
encrypt very-high-level general staff messages.
5
History
BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing
and Notable Roman ciphers such as the Caesar cipher.
1-1799: Leon Battista Alberti invents polyalphabetic cipher, also known
first mechanical cipher machine.
1800-1899: Joseph Henry builds an electric. In Crimean War, Charles
Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of
the time).
6
1900-1949: First break of German Army Enigma by Marian Rejewski in
Poland.
1950-1999: Charles Bennett and Gilles Brassard design the
first quantum cryptography protocol, BB84.
2000 to present: Microsoft and its allies vow to end "full
disclosure" of security vulnerabilities by replacing it
with "responsible" disclosure guidelines.
7
Classic cryptography
The Greek’s idea on cryptography was to
wrap a tape around a stick, and then write
the message on the wound tape. When the
tape was unwound, the writing would be
meaningless. The receiver of the message
would of course have a stick of the same
diameter and use it to decipher the
message.
Reconstructed ancient Greek
scytale, an early cipher device.
8
Computer era
Cryptanalysis of the new mechanical devices
proved to be both difficult and laborious. Just as
the development of digital computers and
electronics helped in cryptanalysis, it made
possible much more complex ciphers.
Furthermore, computers allowed for the
encryption of any kind of data representable in
any binary format, unlike classical ciphers which
only encrypted written language texts.
An example of simple cryptography
9
Terminology
Plaintext:
Message that is going to be transmitted or stored is plain text. Anyone
can read plaintext.
Encryption:
The method by which we can hide the actual meaning of plaintext is
called Encryption.
10
Cipher text:
The result of encryption which results in unreadable gibberish is called
Cipher text.
Decryption:
The method by which the original meaning of cipher text can be
recovered is called Decryption. Simply the process of converting Cipher
text to plaintext is called Decryption.
11
Key:
Key is the secret piece of information which is used for encryption and
decryption in Cryptography.
12
Method of Encryption and Decryption
13
 Some more terms:
Cryptanalysis:
The science of retrieving the plain text from cipher without knowing
the key.
Cryptanalysts:
The people who practice cryptanalysis are called Cryptanalyst.
14
Cryptosystem:
The combination of algorithm, key, and key management functions
used to perform cryptographic operations.
15
 Caesar Cipher
The Caesar cipher, also known as a shift cipher, is one of the simplest
forms of encryption. It is a substitution cipher where each letter in the
original message (called the plaintext) is replaced with a letter
corresponding to a certain number of letters up or down in the
alphabet.
16
Caesar Cipher with shifting value ‘3’
17
We love
Discrete
Mathematics
Zh oryh
Glvfuhwh
Pdwkhpdwlfv
We love
Discrete
Mathematics
Right shift
of
3
Left shift
of
3
Plaintext Cipher Plaintext
18
Cryptography Methods
Symmetric Key:
With Symmetric key Cryptography, a single key is used for both
encryption and decryption. In this figure we can see that the sender
uses the key to encrypt the plain text and send the cipher text to the
receiver. The receiver applies the same key to decrypt the message and
recover the plain text because a single key is used for both function.
Symmetric key Cryptography is also called secret key Cryptography.
With this from of Cryptography, it is obvious that the key must be
known to both the sender and the receiver.
19
Visualization of Symmetric key Cryptography
20
Asymmetric Key:
Asymmetric cryptography was first publicly described by martin
Hellman and his student Whitfield Diffie in 1976. There are two
different keys are used for encryption and decryption. One key is used
to encrypt the plaintext and the other key is used to decrypt the cipher
text the important point is that it doesn’t matter which key is applied
first but the both key is required for the work. Every user has both a
public key and a private key. The private key is kept secret at all times,
but the public key may be freely distributed.
21
Visualization of Asymmetric key Cryptography
22
Difference between Methods
23
Symmetric Cryptography
Examples of encryption:
DES, 3DES, AES and RC4.
24
Asymmetric Cryptography
Examples of encryption:
The most common asymmetric encryption
algorithm is RSA
25
Applications
1. ATM
2. Email-Passwords
3. E-Payment
4. E-Commerce
5. Electronic Voting
6. Defence Services
7. Securing Data
8. Access Control
26
Thank You!
Ad

More Related Content

Similar to Cryptography.pptxhis document provides an overview of cryptography. It defines cryptography as the science of securing messages from att (20)

Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
Crypto_Artemis Final oooo Presentation.pdf
Crypto_Artemis Final oooo Presentation.pdfCrypto_Artemis Final oooo Presentation.pdf
Crypto_Artemis Final oooo Presentation.pdf
ferar27708
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
Cryptography
CryptographyCryptography
Cryptography
Kural Amudhan
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
My cryptography
My cryptographyMy cryptography
My cryptography
NAVYA RAO
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal
 
UNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad InstituteUNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad Institute
SatishPise4
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
Bernhard Hofer
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
sunil sharma
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
SaurabhChakraverty1
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
Cryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and typesCryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and types
sowaibakhan3
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Cryptography cse,ru
Cryptography cse,ruCryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
 
Cryptography
CryptographyCryptography
Cryptography
LaibaRehman3
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
Crypto_Artemis Final oooo Presentation.pdf
Crypto_Artemis Final oooo Presentation.pdfCrypto_Artemis Final oooo Presentation.pdf
Crypto_Artemis Final oooo Presentation.pdf
ferar27708
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
tahirilyas92
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
My cryptography
My cryptographyMy cryptography
My cryptography
NAVYA RAO
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal
 
UNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad InstituteUNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad Institute
SatishPise4
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
Bernhard Hofer
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
sunil sharma
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Cryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and typesCryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and types
sowaibakhan3
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 

Recently uploaded (20)

YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Contact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: OptometryContact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: Optometry
MushahidRaza8
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
Nguyen Thanh Tu Collection
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
National Information Standards Organization (NISO)
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
dynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south Indiadynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south India
PrachiSontakke5
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx   quiz by Ridip HazarikaTHE STG QUIZ GROUP D.pptx   quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
Ridip Hazarika
 
Real GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for SuccessReal GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for Success
Mark Soia
 
Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdfIntroduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
james5028
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Contact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: OptometryContact Lens:::: An Overview.pptx.: Optometry
Contact Lens:::: An Overview.pptx.: Optometry
MushahidRaza8
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
Nguyen Thanh Tu Collection
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
dynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south Indiadynastic art of the Pallava dynasty south India
dynastic art of the Pallava dynasty south India
PrachiSontakke5
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingHow to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
How to Customize Your Financial Reports & Tax Reports With Odoo 17 Accounting
Celine George
 
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx   quiz by Ridip HazarikaTHE STG QUIZ GROUP D.pptx   quiz by Ridip Hazarika
THE STG QUIZ GROUP D.pptx quiz by Ridip Hazarika
Ridip Hazarika
 
Real GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for SuccessReal GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for Success
Mark Soia
 
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdfIntroduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
james5028
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Ad

Cryptography.pptxhis document provides an overview of cryptography. It defines cryptography as the science of securing messages from att

  • 1. Introduction to Cryptography Dr. Gururaj H L Associate Professor Dept.of IT Manipal Institute of Technology, Bengaluru 1
  • 2. 2 Contents • Introduction • History • Terminology • Cryptography Methods • Difference between Methods • Application
  • 3. 3 Introduction Cryptography: Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is closely related to the disciplines of cryptology and cryptanalysis. Cryptography includes techniques such as microdots, merging words with images, and other ways to hide information in storage or transit.
  • 4. 4 German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages.
  • 5. 5 History BCE: Spartan use of scytale, the Egyptians develop hieroglyphic writing and Notable Roman ciphers such as the Caesar cipher. 1-1799: Leon Battista Alberti invents polyalphabetic cipher, also known first mechanical cipher machine. 1800-1899: Joseph Henry builds an electric. In Crimean War, Charles Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of the time).
  • 6. 6 1900-1949: First break of German Army Enigma by Marian Rejewski in Poland. 1950-1999: Charles Bennett and Gilles Brassard design the first quantum cryptography protocol, BB84. 2000 to present: Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines.
  • 7. 7 Classic cryptography The Greek’s idea on cryptography was to wrap a tape around a stick, and then write the message on the wound tape. When the tape was unwound, the writing would be meaningless. The receiver of the message would of course have a stick of the same diameter and use it to decipher the message. Reconstructed ancient Greek scytale, an early cipher device.
  • 8. 8 Computer era Cryptanalysis of the new mechanical devices proved to be both difficult and laborious. Just as the development of digital computers and electronics helped in cryptanalysis, it made possible much more complex ciphers. Furthermore, computers allowed for the encryption of any kind of data representable in any binary format, unlike classical ciphers which only encrypted written language texts. An example of simple cryptography
  • 9. 9 Terminology Plaintext: Message that is going to be transmitted or stored is plain text. Anyone can read plaintext. Encryption: The method by which we can hide the actual meaning of plaintext is called Encryption.
  • 10. 10 Cipher text: The result of encryption which results in unreadable gibberish is called Cipher text. Decryption: The method by which the original meaning of cipher text can be recovered is called Decryption. Simply the process of converting Cipher text to plaintext is called Decryption.
  • 11. 11 Key: Key is the secret piece of information which is used for encryption and decryption in Cryptography.
  • 12. 12 Method of Encryption and Decryption
  • 13. 13  Some more terms: Cryptanalysis: The science of retrieving the plain text from cipher without knowing the key. Cryptanalysts: The people who practice cryptanalysis are called Cryptanalyst.
  • 14. 14 Cryptosystem: The combination of algorithm, key, and key management functions used to perform cryptographic operations.
  • 15. 15  Caesar Cipher The Caesar cipher, also known as a shift cipher, is one of the simplest forms of encryption. It is a substitution cipher where each letter in the original message (called the plaintext) is replaced with a letter corresponding to a certain number of letters up or down in the alphabet.
  • 16. 16 Caesar Cipher with shifting value ‘3’
  • 17. 17 We love Discrete Mathematics Zh oryh Glvfuhwh Pdwkhpdwlfv We love Discrete Mathematics Right shift of 3 Left shift of 3 Plaintext Cipher Plaintext
  • 18. 18 Cryptography Methods Symmetric Key: With Symmetric key Cryptography, a single key is used for both encryption and decryption. In this figure we can see that the sender uses the key to encrypt the plain text and send the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plain text because a single key is used for both function. Symmetric key Cryptography is also called secret key Cryptography. With this from of Cryptography, it is obvious that the key must be known to both the sender and the receiver.
  • 19. 19 Visualization of Symmetric key Cryptography
  • 20. 20 Asymmetric Key: Asymmetric cryptography was first publicly described by martin Hellman and his student Whitfield Diffie in 1976. There are two different keys are used for encryption and decryption. One key is used to encrypt the plaintext and the other key is used to decrypt the cipher text the important point is that it doesn’t matter which key is applied first but the both key is required for the work. Every user has both a public key and a private key. The private key is kept secret at all times, but the public key may be freely distributed.
  • 21. 21 Visualization of Asymmetric key Cryptography
  • 23. 23 Symmetric Cryptography Examples of encryption: DES, 3DES, AES and RC4.
  • 24. 24 Asymmetric Cryptography Examples of encryption: The most common asymmetric encryption algorithm is RSA
  • 25. 25 Applications 1. ATM 2. Email-Passwords 3. E-Payment 4. E-Commerce 5. Electronic Voting 6. Defence Services 7. Securing Data 8. Access Control