Download - Cryptology Ppt

Transcript
Page 1: Cryptology Ppt

PAPER PRESENTATION ON

CRYPTOLOGY

BY:-K.Srinivas

Page 2: Cryptology Ppt

CRYPTOLOGY

Cryptology Also called as cryptography From Greek κρυπτός, kryptos, "hidden,

secret" Is the practice and study of hiding

information

Page 3: Cryptology Ppt

TERMINOLOGY

Encryption

Decryption

Cipher and

Keys

Page 4: Cryptology Ppt

HISTORY OF CRYPTOGRAPHY

The Ancient Greek scytale, probably much

like this modern reconstruction, may have

been one of the earliest devices used to

implement a cipher

Page 5: Cryptology Ppt

TYPES OF CIPHER

Classical ciphers

Substitution ciphers

Polyalphabetic ciphers

Page 6: Cryptology Ppt

EXAMPLES FOR CIPHERS

In Classical cipher type -

“help me” becomes “ehpl em”

In Substitution cipher type -“fly at once”

becomes “gmz bu podf”

Page 7: Cryptology Ppt

POLYALPHABETIC CIPHERS

The Polyalphabetic ciphers were developed

by Leon Battista Alberti around the year

1467.

Page 8: Cryptology Ppt
Page 9: Cryptology Ppt

CREDIT CARD WITH SMART CARD

Page 10: Cryptology Ppt

MODERN CRYPTOGRAPHY

Symmetric-Key cryptography

Public-Key cryptography

Cryptanalysis

Cryptographic primitives

Page 11: Cryptology Ppt

SYMMETRIC-KEY CRYPTOGRAPHY

Block cipher

Example: AES and DES

Stream cipher

Example: RC4

Page 12: Cryptology Ppt

PUBLIC-KEY CRYPTOGRAPHY

Page 13: Cryptology Ppt

PUBLIC-KEY CRYPTOGRAPHY

Public-Key is also called as “Asymmetric-

key”

The Public-Key is used for encryption and

the Private-Key is used for decryption

Page 14: Cryptology Ppt

DIGITAL SIGNATURE

A digital signature is an reminiscent of an

ordinary signature. It uses two algorithms

1. Signing

2. Verification

Page 15: Cryptology Ppt

PADLOCK ICON

Page 16: Cryptology Ppt

CRYPTANALYSIS

The goal of cryptanalysis is to find some

weakness or insecurity in a cryptographic

scheme, thus permitting its subversion or

evasion

Page 17: Cryptology Ppt

CRYPTANALYTICAL ATTACKS Cipher text-only attack

Known-plaintext attack

Chosen-plain text

Page 18: Cryptology Ppt

CRYPTOSYSTEMS

Cryptographic primitives provide

fundamental properties, which are used to

develop more complex tools called

cryptosystems or cryptographic protocols

Page 19: Cryptology Ppt

APPLICATIONS

Security of ATM cards

Computer passwords

Electronic commerce

Page 20: Cryptology Ppt

QUESTIONS

Page 21: Cryptology Ppt

THANK YOU