0% found this document useful (0 votes)
22 views13 pages

Cryptography Gekgsk Version 2

Cryptography is the practice of securing information through techniques like encryption and decryption, ensuring confidentiality, integrity, and authentication. It encompasses various methods including symmetric and asymmetric key cryptography, hashing algorithms, and key management, with applications in secure web browsing, email encryption, and cryptocurrency. The document emphasizes the importance of cryptography in cybersecurity to protect sensitive information and prevent unauthorized access.

Uploaded by

john sp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views13 pages

Cryptography Gekgsk Version 2

Cryptography is the practice of securing information through techniques like encryption and decryption, ensuring confidentiality, integrity, and authentication. It encompasses various methods including symmetric and asymmetric key cryptography, hashing algorithms, and key management, with applications in secure web browsing, email encryption, and cryptocurrency. The document emphasizes the importance of cryptography in cybersecurity to protect sensitive information and prevent unauthorized access.

Uploaded by

john sp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Whitedavid

CRYPTOGRAPHY
https://t.me/whitedavid23
AGENDA
What is Cryptography?
Principles of Cryptography: Confidentiality, Integrity,
Authentication, Non-repudiation
Encryption and Decryption
Types of Cryptography: Symmetric, Asymmetric, Hash
Functions
Key Concepts: Public Key, Private Key, Digital Certificates
Applications of Cryptography in Real Life
WHAT IS CRYPTOGRAPHY
Cryptography is the practice of securing information by
transforming it into unreadable formats to protect it from
unauthorized access.
It ensures confidentiality, data integrity, and authentication
through techniques like encryption and decryption.
Cryptography is the technique of converting readable
information into an unreadable format to protect it from
unauthorized access.
It uses encryption methods to secure communication and ensure
data privacy and authenticity.
PRINCIPLES OF CRYPTOGRAPHY
Confidentiality: Protects sensitive information by ensuring that only authorized
parties can access it, typically through encryption.
Integrity: Ensures that the data remains unchanged during transmission or
storage and that any unauthorized modifications are detectable.
Authentication: Verifies the identity of the sender or receiver in communication,
ensuring that the parties involved are who they claim to be.
Non-repudiation: Prevents individuals from denying their actions, such as
sending a message or completing a transaction, ensuring accountability.
Key Management: Involves securely handling cryptographic keys, including their
generation, exchange, storage, and disposal, to ensure the security of encrypted
data.
ENCRYPTION
Encryption is a cryptographic process that transforms plaintext
(readable and understandable data) into ciphertext (encoded and
unreadable data) using an algorithm and an encryption key. This
ensures that only authorized parties can access the information.

Encryption Algorithms:
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
RSA (Rivest-Shamir-Adleman)
DECRYPTION
Decryption is a cryptographic process that converts ciphertext
(encoded and unreadable data) back into plaintext (its original,
readable form) using a decryption algorithm and a key. It is the
reverse process of encryption and ensures that only authorized
users can access the original data.

Decryption Algorithms:
Same as Algorithms used in Encryptions, but needed decryption
key to get the original plaintext.
SOME OF THE TYPES OF CRYPTOGRAPHY METHODS
Symmetric Key Cryptography
Asymmetric Key Cryptography
Hash Functions
Hybrid Cryptography
Steganography
Quantum Cryptography
Homomorphic Cryptography
Blockchain Cryptography
1. SYMMETRIC KEY CRYPTOGRAPHY
Symmetric Key Cryptography is an encryption technique also known as (Secret key Cryptography)
where a single key is used for both encryption and decryption of data. The same key is shared
between the sender and receiver, making it essential to keep the key secure to maintain
confidentiality.

How It Works:
Key Generation
Encryption
Transmission
Decryption
Algorithms Used
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
Blowfish
RC4
2. ASYMMETRIC KEY CRYPTOGRAPHY
Asymmetric Key Cryptography, also known as Public Key Cryptography, is an encryption technique
that uses two separate keys: one for encryption (public key) and one for decryption (private key). The
public key is openly shared, while the private key is kept secret. This method is commonly used in
modern cryptographic systems, including secure communication and digital signatures.

How It Works:
Key Generation
Encryption
Transmission
Decryption
Algorithms Used
RSA (Rivest–Shamir–Adleman)
Elliptic Curve Cryptography (ECC)
Diffie-Hellman (DH)
DSA (Digital Signature Algorithm)
ElGamal Encryption
3. HASHING ALGORITHMS
Hashing algorithms are cryptographic functions that take an input (or message) and return a fixed-
size string of characters, which is typically a hash value or digest. The output is unique to the input,
meaning even a small change in the input will produce a significantly different hash. Hashing is
primarily used for data integrity, password storage, and digital signatures.
How It Works:
Input Data
Using Hash Function
Fixed-Size Output
Hash Value
Hashing Algorithms Used:
MD5 (Message Digest Algorithm 5)
SHA-1 (Secure Hash Algorithm 1)
SHA-2 (Secure Hash Algorithm 2)
SHA-3 (Secure Hash Algorithm 3)

And Some more Cryptographic Methods...


SOME KEY CONCEPTS OF CRYPTOGRAPHY
Below are some of the key concepts commonly used in cryptographic systems:
Private Key
A key that is made available publicly and used to encrypt data or verify digital
signatures.
Public key
A secret key that is kept confidential and used for decrypting data or creating
digital signatures.
Digital Signature
A cryptographic signature that verifies the authenticity of a message or
document.
Digital Certificate
A certificate issued by a trusted authority (Certificate Authority) to confirm the
identity of a public key holder.
CRYPTOGRAPHY APPLICATIONS IN REAL LIFE
Secure Web Browsing (HTTPS)
Email Encryption
Virtual Private Networks (VPNs)
Two-Factor Authentication (2FA)
Cryptocurrency (Bitcoin, Ethereum, etc.)
Cloud Storage Encryption
Secure Messaging Apps (End-to-End Encryption)
File and Disk Encryption
Secure Voice Calls (VoIP Encryption)
Blockchain Technology
CRYPTOGRAPHY CONCLUSION
Cryptography is a critical component of cybersecurity, ensuring the
confidentiality, integrity, and authenticity of data.
It protects sensitive information through encryption, preventing
unauthorized access during transmission and storage.
Cryptographic techniques like digital signatures and public/private
keys are essential for verifying identities and preventing unauthorized
access.
Secure communication protocols such as SSL/TLS and VPNs rely on
cryptography to safeguard online transactions and communications.
It also helps defend against cyber threats like man-in-the-middle
attacks, identity theft, and data breaches.

You might also like