Escolar Documentos
Profissional Documentos
Cultura Documentos
CRYPTOGRAPHY
Presented By ANIKET JOSHI B.E. 7th sem, Electronics & communication Engineering Guided By: Prof. R.M. REWATKAR Dept. Of Electronics & communication Engineering Bhagwati Chaturvedi College of Engineeing , Nagpur
INDEX
1. 2. 3. 4. 5. 6. 7. 8. 9. Introduction What is Cryptography Types of cryptography Keys Digital signature Digital certificate Application Conclusion Reference
INTRODUCTION
Cryptography is the technique to hide confidential data. It enables storage of sensitive information or transmit across insecure networks like the internet. Using this technique valuable information can be protected. Encryption, digital signatures, password-based user authentication are some of the basic cryptographic techniques for securing communications.
What Is Cryptography?
Cryptography is the science of using a mathematics to encrypt & decrypt data. Data that can be read & understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption. The process of reverting ciphertext to its original plaintext is called decryption.
Types of cryptography
1. Conventional cryptography 2. Public-key cryptography 3. PGP or hybrid crypto system
Conventional cryptography
It is also called as a secret-key or symmetric-key encryption. In this only one key is used for both encryption and decryption. Data Encryption Standard (DES) is an example of conventional cryptosystem.
K E Y
CIPHER
PLAIN TEXT
K E Y TEXT
PLAIN TEXT
ENCRYPTION
DECRYPTION
Public-key cryptography
The problem of key distribution are solved by public-key cryptography. It uses a pair of key. Public key :- which encrypts data. Private key :- which decrypts data. Since it uses two keys it is also called as asymmetric cryptography.
PUBLIC KEY PLAINT EXT
ENCRYPTION
PRIVATE KEY
CIPHER
TEXT
DECRYPTION
PLAINT EXT
Keys
A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically measured in bits. In public key cryptography, the bigger the key, the more secure the ciphertext. This makes it very important to pick keys of the right size; large enough to be secure, but small enough to be applied fair quickly.
Digital signature
A major benefit of public key cryptography is that it provides a method for employing digital signatures. Digital signatures let the recipient of information verify the authenticity of the informations origin. It also verify that the information was not altered while in transit. Thus, public key digital signatures provide authentication & data integrity.
PRIVATE KEY
ORIGINAL
SIGNED
PUBLIC KEY
VERIFIED
TEXT
SIGNING
TEXT
VERYING
TEXT
Digital certificates
Digital certificates or certs, simplify the task of establishing wheather a public key truly belongs to the purported owner. A digital certificate is information included with a person public key that helps others verify that a key is a genuine or valid. A digital certificate comprise of three things :A public key. Certificate information. One or more digital signatures.
Applications of Cryptography
Military applications, where the data to be sent is extremely confidential Online banking transactions, where the account details should be maintained highly secure to prevent any misuse. Online shopping mechanism, where the credit card no. and details must be kept hidden. Any other communication where the data to be send is very sensitive and needs security.
Conclusion
Cryptography is the method that involves mathematical operation on a text so as to prevent unauthorized persons from reading it. Digital certificate and digital signatures ensure the originality and authentication of the information. Size of the key is very important for securing the information.
1. Bibliography of Quantum Cryptography Gilles Brassard 2. Cryptography systems By Prof. Dong- Wook Kim 3. Cryptography D.R. Stinson 4. Encryption Fundamentals Hugo Fruehauf 5. An Introduction to Cryptography Phil Zimmermann 6. Applied cryptology Bruce Schneider 7. Cryptography and network security Atul Khanate 8. IEEE issues Dec 2003
References
Thank You