+ All Categories
Home > Technology > Cryptography

Cryptography

Date post: 08-Jun-2015
Category:
Upload: naman-distro
View: 1,017 times
Download: 0 times
Share this document with a friend
Description:
A great info And ppt On Cryptography..
Popular Tags:
13
Cryptography By Naman Singh
Transcript
Page 1: Cryptography

CryptographyBy Naman Singh

Page 2: Cryptography

• The Art Of protecting Information By transforming (Encrypting) It into an Unreadable Format

• Cryptanalysis iz the study on How to crack encryption Algorithms Or there Implementation

What Iz Cryptography…..?

Page 3: Cryptography

What Iz Cryptography…..?

Page 4: Cryptography

History of Cryptology

Cryptography has roots that began around 2000 B.C. in Egypt when hieroglyphics were used to decorate tombs to tell the story of the life of the deceased.

A Hebrew cryptographic method required the alphabet to be flipped so that each letter in the original alphabet is mapped to a different letter in the flipped alphabet.

The encryption method was called atbash.ABCDEFGHI JK LMNOPQ R STU VW XYZZYXWVUTSR QP ONMLKJ I HGF ED CBASecurity= hvxfirgb

Page 5: Cryptography

Continue…Around 400 B.C., the Spartans used a system of encrypting information by writing a message on a sheet of papyrus, which was wrapped around a staff.

Page 6: Cryptography

Two Major Classification…

Classical Modern

Page 7: Cryptography

Modern Algorithm System..,

Page 8: Cryptography

TYPES OF CRYPTOGRAPHIC ALGORITHMS

• There are several ways of classifying cryptographic algorithms. For purposes of this paper, they will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The three types of algorithms that will be discussed are (Figure 1):

• Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption

• Public Key Cryptography (PKC): Uses one key for encryption and another for decryption

• Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information

Page 9: Cryptography

Why Three Encryption Techniques?

Page 10: Cryptography

Application

• Used for Security issues

• Used by Social networks to provide Security.

• Used to pass message secretly.

• Used during War times.

• Securing are source codes.

• And many more….

Page 11: Cryptography

Live Demonstration:

Page 12: Cryptography

This iz was an Over All knowledge about cryptography……

Thank You……

Page 13: Cryptography

Query???


Recommended