0% found this document useful (0 votes)
41 views12 pages

Endec (Encoding/Decoding) : Group - 7 1.manisha Sinha. 2.shriya. 3.lalit Bhanot. 4.jasvinder Anand

This document discusses cryptography and cryptographic algorithms. It outlines an introduction to cryptography, an overview of cryptography including its uses for authentication, privacy, and integrity. It then describes the main types of cryptographic algorithms - secret key cryptography using a single key, public key cryptography using two keys, and hash functions which irreversibly "encrypt". It also covers the scope involving security of multimedia over open networks and tools including Java Swing for building graphical user interfaces.

Uploaded by

Jasvinder Anand
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views12 pages

Endec (Encoding/Decoding) : Group - 7 1.manisha Sinha. 2.shriya. 3.lalit Bhanot. 4.jasvinder Anand

This document discusses cryptography and cryptographic algorithms. It outlines an introduction to cryptography, an overview of cryptography including its uses for authentication, privacy, and integrity. It then describes the main types of cryptographic algorithms - secret key cryptography using a single key, public key cryptography using two keys, and hash functions which irreversibly "encrypt". It also covers the scope involving security of multimedia over open networks and tools including Java Swing for building graphical user interfaces.

Uploaded by

Jasvinder Anand
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 12

Endec

(Encoding/Decoding)

Group -7
1.Manisha Sinha.
2.Shriya.
3.Lalit Bhanot.
4.Jasvinder Anand
Outline

• Introduction .
• PROJECT OVERVIEW(CRYPTOGRAPHY).
• TYPES OF CRYPTOGRAPHIC ALGORITHMS
• Scope.
• Tools.
INTRODUCTION

• Enable us to feel the real-time environment.


• Properly applied it can provide a secure
communication channel.
• Even when the underlying system and
network infrastructure is not secure.
Outline

• Introduction .
• PROJECT OVERVIEW(CRYPTOGRAPHY).
• TYPES OF CRYPTOGRAPHIC ALGORITHMS
• Scope.
• Tools.
PROJECT OVERVIEW
(CRYPTOGRAPHY)
• Cryptography is the science of writing in
secret code.
• Authentication.
• Privacy/confidentiality.
• Integrity.
Outline

• Introduction .
• PROJECT OVERVIEW(CRYPTOGRAPHY).
• TYPES OF CRYPTOGRAPHIC ALGORITHMS
• Scope.
• Tools.
TYPES OF CRYPTOGRAPHIC
ALGORITHMS

• There are several ways of classifying


cryptographic algorithms.
• They will be categorized based on the
number of keys that are employed
for encryption and decryption, and further
defined by their application and use.
The three types of algorithms are:

• Secret Key Cryptography (SKC): Uses a single


key for both encryption and decryption.
• Public Key Cryptography (PKC): Uses one key
for encryption and another for decryption.
• Hash Functions: Uses a mathematical
transformation to irreversibly “encryption”.
Outline

• Introduction .
• PROJECT OVERVIEW(CRYPTOGRAPHY).
• TYPES OF CRYPTOGRAPHIC ALGORITHMS
• Scope.
• Tools.
Scope

• Rapid development of multimedia data


management technologies over the internet .
•Need to concern about the network, security
and privacy of information.
•As the networking forms are the open source
for all the users, so security of forms is a
critical issue.
Outline

• Introduction .
• PROJECT OVERVIEW(CRYPTOGRAPHY).
• TYPES OF CRYPTOGRAPHIC ALGORITHMS
• Scope.
• Tools.
Tools

• Java Swing
• Swing is the primary Java GUI widget
toolkit.
• It is part of Sun Microsystems Java
Foundation Classes (JFC).
• An API for providing a graphical user
interface (GUI) for Java programs.

You might also like