Você está na página 1de 16

Smt.

Bhagwati Chaturvedi College of Engineering Seminar on,

CRYPTOGRAPHY
Presented By ANIKET JOSHI B.E. 7th sem, Electronics & communication Engineering Guided By: Prof. R.M. REWATKAR Dept. Of Electronics & communication Engineering Bhagwati Chaturvedi College of Engineeing , Nagpur

INDEX
1. 2. 3. 4. 5. 6. 7. 8. 9. Introduction What is Cryptography Types of cryptography Keys Digital signature Digital certificate Application Conclusion Reference

INTRODUCTION
Cryptography is the technique to hide confidential data. It enables storage of sensitive information or transmit across insecure networks like the internet. Using this technique valuable information can be protected. Encryption, digital signatures, password-based user authentication are some of the basic cryptographic techniques for securing communications.

What Is Cryptography?
Cryptography is the science of using a mathematics to encrypt & decrypt data. Data that can be read & understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. The process of reverting ciphertext to its original plaintext is called decryption.

Types of cryptography
1. Conventional cryptography 2. Public-key cryptography 3. PGP or hybrid crypto system

Conventional cryptography
It is also called as a secret-key or symmetric-key encryption. In this only one key is used for both encryption and decryption. Data Encryption Standard (DES) is an example of conventional cryptosystem.
K E Y
CIPHER

PLAIN TEXT

K E Y TEXT

PLAIN TEXT

ENCRYPTION

DECRYPTION

Public-key cryptography
The problem of key distribution are solved by public-key cryptography. It uses a pair of key. Public key :- which encrypts data. Private key :- which decrypts data. Since it uses two keys it is also called as asymmetric cryptography.
PUBLIC KEY PLAINT EXT
ENCRYPTION

PRIVATE KEY
CIPHER

TEXT
DECRYPTION

PLAINT EXT

PGM or Hybrid cryptosystem


PGP combine some of the best features of conventional & public-key cryptography. It first compresses the plaintext which saves modem transmission time & disk space & strengthens its security. Once the data is encrypted, session key is then encrypted to the recipients public key. The recipients copy of PGP uses his private key to recover the session key, which PGP uses to decrypt the conventionally encrypted ciphertext.

Keys
A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically measured in bits. In public key cryptography, the bigger the key, the more secure the ciphertext. This makes it very important to pick keys of the right size; large enough to be secure, but small enough to be applied fair quickly.

Digital signature
A major benefit of public key cryptography is that it provides a method for employing digital signatures. Digital signatures let the recipient of information verify the authenticity of the informations origin. It also verify that the information was not altered while in transit. Thus, public key digital signatures provide authentication & data integrity.
PRIVATE KEY
ORIGINAL

SIGNED

PUBLIC KEY

VERIFIED

TEXT
SIGNING

TEXT
VERYING

TEXT

Digital certificates
Digital certificates or certs, simplify the task of establishing wheather a public key truly belongs to the purported owner. A digital certificate is information included with a person public key that helps others verify that a key is a genuine or valid. A digital certificate comprise of three things :A public key. Certificate information. One or more digital signatures.

Applications of Cryptography
Military applications, where the data to be sent is extremely confidential Online banking transactions, where the account details should be maintained highly secure to prevent any misuse. Online shopping mechanism, where the credit card no. and details must be kept hidden. Any other communication where the data to be send is very sensitive and needs security.

Conclusion
Cryptography is the method that involves mathematical operation on a text so as to prevent unauthorized persons from reading it. Digital certificate and digital signatures ensure the originality and authentication of the information. Size of the key is very important for securing the information.

1. Bibliography of Quantum Cryptography Gilles Brassard 2. Cryptography systems By Prof. Dong- Wook Kim 3. Cryptography D.R. Stinson 4. Encryption Fundamentals Hugo Fruehauf 5. An Introduction to Cryptography Phil Zimmermann 6. Applied cryptology Bruce Schneider 7. Cryptography and network security Atul Khanate 8. IEEE issues Dec 2003

References

Thank You

Você também pode gostar