Uploaded on Mar 22, 2022
PPT on Ultimate Guide on Cryptography Technology.
Ultimate Guide on Cryptography Technology
Click to edit Master title style
CRYPTOGRAPHY
TECHNOLOGY
1
ICnlticrokd tuoc etidoint Master title style
• Cryptography is technique of securing information and
communications through use of codes so that only those
person for whom the information is intended can
understand it and process it. Thus preventing unauthorized
access to information.
2 2
Source: www.geeksforgeeks.org
Clriycpkt toog readpiht yM taesctehrn otiltolgey style
• In Cryptography the techniques which are use to protect
information are obtained from mathematical concepts and a
set of rule based calculations known as algorithms to
convert messages in ways that make it hard to decode it.
• These algorithms are used for cryptographic key
generation, digital signing, verification to protect data
privacy, web browsing on internet and to protect
confidential transactions such as credit card and debit card
transactions.
3 3
Source: www.geeksforgeeks.org
TCleickh ntioq uedesit uMsaesdt eFro rti tClrey spttyolgeraphy
• In today’s age of computers cryptography is often
associated with the process where an ordinary plain text is
converted to cipher text which is the text made such that
intended receiver of the text can only decode it and hence
this process is known as encryption.
4 4
Source: www.geeksforgeeks.org
Click to edit Master title style
Features Of
Cryptography
5
Cloinckfi dtoe netdiaitl iMtyaster title style
• Information can only be accessed by the person for whom it
is intended and no other person except him can access it.
6 6
Source: www.geeksforgeeks.org
ICnlticekg rtioty edit Master title style
• Information cannot be modified in storage or transition
between sender and intended receiver without any addition
to information being detected.
7 7
Source: www.geeksforgeeks.org
NCloicnk-r teop uedita tMioanster title style
• The creator/sender of information cannot deny his or her
intention to send information at later stage.
8 8
Source: www.geeksforgeeks.org
CAluicthke tnot iecdaiti oMnaster title style
• The identities of sender and receiver are confirmed. As well
as destination/origin of information is confirmed.
9 9
Source: www.geeksforgeeks.org
Click to edit Master title style
Types Of
Cryptography
10
SCylimckm teot reidci tK eMya sCtreyrp tiotlger asptyhlye
• It is an encryption system where the sender and receiver of
message use a single common key to encrypt and decrypt
messages.
• Symmetric Key Systems are faster and simpler but the
problem is that sender and receiver have to somehow
exchange key in a secure manner.
• The most popular symmetric key cryptography system is
Data Encryption System(DES).
1111
Source: www.geeksforgeeks.org
HClaicshk Ftou necdtiito Mnsaster title style
• There is no usage of any key in this algorithm. A hash value
with fixed length is calculated as per the plain text which
makes it impossible for contents of plain text to be
recovered. Many operating systems use hash functions to
encrypt passwords.
1122
Source: www.geeksforgeeks.org
AClsiycmk mtoe etrdiict KMeays tCery tpitloeg rsatyplhey
• Under this system a pair of keys is used to encrypt and
decrypt information. A public key is used for encryption and
a private key is used for decryption.
1133
Source: www.geeksforgeeks.org
Comments