Cryptography
Cryptography
BRANCH :- IT - ‘B’
by Niraj Kumar
History of Secret Codes and
Ciphers
1 Ancient Times
Early forms of cryptography used for military and diplomatic
purposes. Julius Caesar's cipher was one of the first known
examples.
2 Medieval Era
Sophisticated ciphers and code books emerged, including the
Enigma machine used by Nazi Germany during World War II.
3 Modern Era
The development of computers revolutionized cryptography. The
rise of symmetric key algorithms like DES and AES.
Core Principles: Same Key for Encryption and
Decryption
Encryption Decryption
Transforming plain text into an unreadable format using a Reversing the encryption process to retrieve the original
secret key. message using the same secret key.
Common Symmetric Algorithms (AES, DES, 3DES)
Encrypt data in fixed-size blocks, often used for secure Encrypt data bit-by-bit, typically used for real-time
communication. applications, such as secure audio and video streaming.
Key Distribution Challenge:
The Achilles' Heel
Securely Sharing
The difficulty of distributing the secret key without
compromising its confidentiality.
Compromised Key
If the key is intercepted, all encrypted data is vulnerable
to decryption.
Real-world Applications and
Use Cases
Financial
Transactions
Security Best Practices and Future Trends
1 Regular Key Updates 2 Strong Key Management Systems