Cryptography Gekgsk Version 2
Cryptography Gekgsk Version 2
CRYPTOGRAPHY
https://t.me/whitedavid23
AGENDA
What is Cryptography?
Principles of Cryptography: Confidentiality, Integrity,
Authentication, Non-repudiation
Encryption and Decryption
Types of Cryptography: Symmetric, Asymmetric, Hash
Functions
Key Concepts: Public Key, Private Key, Digital Certificates
Applications of Cryptography in Real Life
WHAT IS CRYPTOGRAPHY
Cryptography is the practice of securing information by
transforming it into unreadable formats to protect it from
unauthorized access.
It ensures confidentiality, data integrity, and authentication
through techniques like encryption and decryption.
Cryptography is the technique of converting readable
information into an unreadable format to protect it from
unauthorized access.
It uses encryption methods to secure communication and ensure
data privacy and authenticity.
PRINCIPLES OF CRYPTOGRAPHY
Confidentiality: Protects sensitive information by ensuring that only authorized
parties can access it, typically through encryption.
Integrity: Ensures that the data remains unchanged during transmission or
storage and that any unauthorized modifications are detectable.
Authentication: Verifies the identity of the sender or receiver in communication,
ensuring that the parties involved are who they claim to be.
Non-repudiation: Prevents individuals from denying their actions, such as
sending a message or completing a transaction, ensuring accountability.
Key Management: Involves securely handling cryptographic keys, including their
generation, exchange, storage, and disposal, to ensure the security of encrypted
data.
ENCRYPTION
Encryption is a cryptographic process that transforms plaintext
(readable and understandable data) into ciphertext (encoded and
unreadable data) using an algorithm and an encryption key. This
ensures that only authorized parties can access the information.
Encryption Algorithms:
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
RSA (Rivest-Shamir-Adleman)
DECRYPTION
Decryption is a cryptographic process that converts ciphertext
(encoded and unreadable data) back into plaintext (its original,
readable form) using a decryption algorithm and a key. It is the
reverse process of encryption and ensures that only authorized
users can access the original data.
Decryption Algorithms:
Same as Algorithms used in Encryptions, but needed decryption
key to get the original plaintext.
SOME OF THE TYPES OF CRYPTOGRAPHY METHODS
Symmetric Key Cryptography
Asymmetric Key Cryptography
Hash Functions
Hybrid Cryptography
Steganography
Quantum Cryptography
Homomorphic Cryptography
Blockchain Cryptography
1. SYMMETRIC KEY CRYPTOGRAPHY
Symmetric Key Cryptography is an encryption technique also known as (Secret key Cryptography)
where a single key is used for both encryption and decryption of data. The same key is shared
between the sender and receiver, making it essential to keep the key secure to maintain
confidentiality.
How It Works:
Key Generation
Encryption
Transmission
Decryption
Algorithms Used
Data Encryption Standard (DES)
Triple DES (3DES)
Advanced Encryption Standard (AES)
Blowfish
RC4
2. ASYMMETRIC KEY CRYPTOGRAPHY
Asymmetric Key Cryptography, also known as Public Key Cryptography, is an encryption technique
that uses two separate keys: one for encryption (public key) and one for decryption (private key). The
public key is openly shared, while the private key is kept secret. This method is commonly used in
modern cryptographic systems, including secure communication and digital signatures.
How It Works:
Key Generation
Encryption
Transmission
Decryption
Algorithms Used
RSA (Rivest–Shamir–Adleman)
Elliptic Curve Cryptography (ECC)
Diffie-Hellman (DH)
DSA (Digital Signature Algorithm)
ElGamal Encryption
3. HASHING ALGORITHMS
Hashing algorithms are cryptographic functions that take an input (or message) and return a fixed-
size string of characters, which is typically a hash value or digest. The output is unique to the input,
meaning even a small change in the input will produce a significantly different hash. Hashing is
primarily used for data integrity, password storage, and digital signatures.
How It Works:
Input Data
Using Hash Function
Fixed-Size Output
Hash Value
Hashing Algorithms Used:
MD5 (Message Digest Algorithm 5)
SHA-1 (Secure Hash Algorithm 1)
SHA-2 (Secure Hash Algorithm 2)
SHA-3 (Secure Hash Algorithm 3)