0% found this document useful (0 votes)
10 views20 pages

REPORT 1 - Merged

This document is a technical seminar report on 'Cryptography Technology' submitted by Keerti Khanagoudra at Government Engineering College Talakal. It discusses the importance of cryptography in securing digital communication, detailing various cryptographic techniques such as symmetric and asymmetric key algorithms, cryptographic hash functions, and emerging technologies like quantum cryptography. The report emphasizes the need for ongoing research to address challenges posed by evolving cyber threats and quantum computing.

Uploaded by

preetipatil1243
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views20 pages

REPORT 1 - Merged

This document is a technical seminar report on 'Cryptography Technology' submitted by Keerti Khanagoudra at Government Engineering College Talakal. It discusses the importance of cryptography in securing digital communication, detailing various cryptographic techniques such as symmetric and asymmetric key algorithms, cryptographic hash functions, and emerging technologies like quantum cryptography. The report emphasizes the need for ongoing research to address challenges posed by evolving cyber threats and quantum computing.

Uploaded by

preetipatil1243
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Government Of Karnataka

Department Of Collegiate and Technical Education

GOVERNMENT ENGINEERING COLLEGE TALAKAL,


KOPPAL-583238
(AFFILATED TO VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI-590018)

A TECHNICAL SEMINAR REPORT ON

“CRYPTOGRAPHY TECHNOLOGY”
Submitted By
KEERTI KHANAGOUDRA 2LG21CS061

Under the Guidance of


Prof. VEERESH

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


2024-25
Government Of Karnataka

Department Of Collegiate and Technical Education

GOVERNMENT ENGINEERING COLLEGE TALAKAL, KOPPAL-583238

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE

Certified that the Technical Seminar entitled “CRYPTOGRAPHY TECHNOLOGY” carried out by
Mr/Ms KEERTI KHANAGOUDRA USN 2LG21CS061 a Bonafide student of B.E 8th Semester in
partial fulfillement for award of Bachelor Engineering in Computer Science and Engineering of the
Visvesvaraya Technological University, Belagavi, during the year 2024-2025. It certified that all
corrections/suggestions indicated for Internal Assessment have been incorporated in the Report deposited
in the Departmental Library.

The project report has been approved as it satisfies the academic requirements in respect of Technical
Seminar prescribed for the said Degree.

Signature of Guide Signature of HOD

Signature of the Principal

Name of the Examiners: Signature with Date:

1……………….......... ……………………

2……………………. …………………....
ACKNOWLEDGEMENT

I consider it a privilege to express a few words of gratitude in depth and respect to all those, who guided
and inspired for the successful completion of this seminar.

Our sincere thanks to our beloved principal, Dr. VIRUPAXI BAGODI Government Engineering College,
Talakal, for kind co-operation during our entire course

I would like to express our immense gratefulness to our beloved Guide Prof. VEERESH, Department of
Computer Science and Engineering, for his guidance and support throughout our seminar work.

I express our sincere gratitude to our beloved HOD Prof. VEERESH, Department of Computer Science
and Engineering, for major source of inspiration, co-operation and guidance.

I thankful to all the faculty members of Computer Science and Engineering for their valuable support and
co-operation.

I thankful to our Parents and Friends for their love, encouragement, affectionand moral support showered on
us during our entire course.
Cordially,

KEERTI KHANAGOUDRA 2LG21CS061

i
ABSTRACT

Cryptography is a cornerstone of modern digital security, providing essential tools to protect


information in an increasingly connected world. In computer network, information has been
broadly exchanging over the communication system but the security over the communication
system is not very sufficient and the data can be breached by interceptors. To provide security
over the communication system, cryptography technique is used. It encompasses a broad
range of techniques that secure communication and data through mathematical algorithms
and protocols. This technology ensures four critical aspects of information security:
confidentiality (preventing unauthorized access), integrity (ensuring data is unaltered),
authentication (verifying identities), and non-repudiation (preventing denial of actions). This
paper delves into the core types of cryptography, including symmetric key algorithms (e.g.,
AES), which use a single shared key for both encryption and decryption, and asymmetric
key algorithms (e.g., RSA, ECC), which use a public-private key pair to enhance security in
open networks. It also examines cryptographic hash functions (e.g., SHA-256) that provide
secure data fingerprinting, and digital signatures that ensure authenticity and integrity in
digital communications. In addition to traditional methods, the paper explores cutting-edge
developments such as quantum cryptography, which promises theoretically unbreakable
encryption using principles of quantum mechanics, and homomorphic encryption, which
allows computation on encrypted data without decryption. The role of cryptography in
blockchain technology, cybersecurity, secure communication protocols (such as SSL/TLS),
and secure storage is also highlighted. The growing sophistication of cyber threats and the
rise of quantum computing present significant challenges to current cryptographic standards.
As a result, ongoing research and international collaboration are crucial in developing
quantum-resistant algorithms and future-proof security infrastructures.

ii
Table of Contents

SI.NO CHAPTER NAMES PAGE NO

Acknowledgment i

Abstract ii
Table of Contents iii
List of Figures iv
1 Introduction 1
2 Literature Survey 2
3 Types Of Cryptography Technology 3
4 Cryptographic Algorithms And Techniques 5

5 Methodology 7
6 Advantages/Disadvantages 9
7 Applications 10
8 Future Scope 11
Conclusion
References

iii
List of Figures
FIG.NO FIG NAME PAGE NO

3.1 Types Of Cryptography Technology 3

3.2 Symmetric Key Cryptography 3

3.3 Asymmetric Key Cryptography 4


5.1 Methodology 7

iv
Cryptography Technology

CHAPTER 1
INTRODUCTION

Cryptography is a technique to achieve confidentiality of messages. The term has a specific


meaning in Greek: “secret writing”. Nowadays, however, the privacy of individuals and
organizations is provided through cryptography at a high level, making sure that information
sent is secure in a way that the authorized receiver can access this information. With historical
roots, cryptography can be considered an old technique that is still being developed. The ability
to protect and secure data which has been sent from one user to another user is becoming
necessary to the growth of electronic commerce, social media, information and data sharing.
This data sharing should be safe and secure. So, this has led to the growth of many
cryptography techniques which are based on many algorithms and mathematical theories.
Generally, Cryptography is the training and investigation of procedures for secure
correspondence within the sight of outsiders called foes. It includes making composed or
created codes that enable data to be kept mystery. It changes over information into an
arrangement known as cipher text that is mixed up for an unapproved client, enabling it to be
transmitted without unapproved entities being able to read it. The process of transforming
plaintext into cipher text is known as encryption and vice versa is known as decryption.

All cryptographic techniques are broadly categorized as Symmetric cryptography and


asymmetric cryptography. In symmetric cryptography, both sender and receiver uses a single
key for encryption as well as decryption and in asymmetric cryptography, public key is utilized
by the sender to scramble the message and the private key is utilized by the collector to decode
the message. Plaintext sent by a sender to receiver has to be protected during the whole
transmission from an inceptor or from an attacker or from an unauthorized party which tries
to determine the data. So, in order to protect the data encryption algorithm is applied on a
given plaintext along with the encryption key which is a value that is known only to sender
and sender uses this key along with plaintext to compute the cipher text and to decrypt the
cipher text, there is a decryption algorithm which is also a mathematical process which uses
the cipher text along with decryption key which is a value that is known only to receiver and
receiver uses this key to compute the plaintext. This algorithm inputs cipher text and
decryption key and then produces the output i.e., plaintext.

DEPT OF CSE, GEC TALAKAL 1


Cryptography Technology

CHAPTER 2

LITERATURE SURVEY

Susan et al. pointed out that network and computer security is a new and fast-moving
technology within the computer science field, with computer security teaching to be a target
that never stops moving. Algorithmic and mathematic aspects, such as hashing techniques and
encryption, are the main focus of security courses. As crackers find ways to hack network
systems, new courses are created that cover the latest type of attacks, but each of these attacks
become outdated daily due to the responses from new security software. With the continuous
maturity of security terminology, security techniques and skills continue to emerge in the
practice of business, network optimization, security architecture, and legal foundation. Othman
O. Khalifa et al. demonstrated the primary basic concepts, characteristics, and goals of
cryptography. They discussed that in our age, i.e. the age of information, communication has
contributed to the growth of technology and therefore has an important role that requires
privacy to be protected and assured when data is sent through the medium of communication.
Nitin Jirwan et al. referred to data communication as depending mainly on digital data
communication, in which data security has the highest priority when using encryption
algorithms in order for data to reach the intended users safely without being compromised.
They also demonstrated the various cryptographic techniques that are used in the process of
data communication, such as symmetric and asymmetric methods. In a review on network
security and cryptography, Sandeep Tayal et al. mentioned that with the emergence of social
networks and commerce applications, huge amounts of data are produced daily by
organizations across the world. This makes information security a huge issue in terms of
ensuring that the transfer of data through the web is guaranteed. With more users connecting
to the internet, this issue further demonstrates the necessity of cryptography techniques. This
paper provides an overview of the various techniques used by networks to enhance security,
such as cryptography. Sad khan, S. B. pointed to the main process and trends of the fields in
cryptography the time of Julius Cesar till the modern era, as well as mentioning the current
status of the Arabic industrial and academical efforts in this field in the past that is related to
thee existing cryptographic and search for new evaluation methods for the security of
information.

DEPT OF CSE, GEC TALAKAL 2


Cryptography Technology

CHAPTER 3
TYPES OF CRYPTOGRAPHY TECHNOLOGY

Fig 3.1: Types Of Cryptography Technology

1. Symmetric Key Cryptography


It is an encryption system where the sender and receiver of a message use a single
common key to encrypt and decrypt messages. Symmetric Key cryptography is faster
and simpler but the problem is that the sender and receiver have to somehow exchange
keys securely. The most popular symmetric key cryptography systems are Data
Encryption Systems (DES) and Advanced Encryption Systems (AES) .

Fig 3.2: Symmetric Key Cryptography

DEPT OF CSE, GEC TALAKAL 3


Cryptography Technology

2. Asymmetric Key Cryptography


In Asymmetric Key Cryptography, a pair of keys is used to encrypt and decrypt
information. A sender’s public key is used for encryption and a receiver’s private key is
used for decryption. Public keys and Private keys are different. Even if the public key
is known by everyone the intended receiver can only decode it because he alone knows
his private key. The most popular asymmetric key cryptography algorithm is the RSA
algorithm.

Fig 3.3: Asymmetric Key Cryptography

3. Hash Functions
There is no usage of any key in this algorithm. A hash value with a fixed length is
calculated as per the plain text which makes it impossible for the contents of plain text
to be recovered. Many operating systems use hash functions to encrypt passwords.

DEPT OF CSE, GEC TALAKAL 4


Cryptography Technology

CHAPTER 4

CRYPTOGRAPHIC ALGORITHMS AND


TECHNIQUES
Cryptographic algorithms are mathematical formulas used to transform data (encryption) and
reverse that transformation (decryption) for secure communication and data protection. They
are the foundation of modern cybersecurity, enabling secure online transactions, encrypted
messaging, and the protection of sensitive data. Popular algorithms include RSA, AES, and
ECC.

4.1 Cryptographic Algorithms:


➢ RSA (Rivest-Shamir-Adleman)
• Working Principle: RSA is a public-key algorithm that relies on the difficulty of
factoring large numbers into their prime factors.
• It uses a pair of keys: a public key for encryption and a private key for
decryption.
• Real-World Usage: Secure online transactions (HTTPS), digital signatures, and
key exchange protocols (e.g., SSH).
➢ AES (Advanced Encryption Standard)
• Working Principle: AES is a symmetric-key algorithm (using the same key for
encryption and decryption) that uses a block cipher, meaning it encrypts data in
fixed-size blocks.
• Real-World Usage: Encryption of data in transit (e.g., encrypted storage) and at
rest (e.g., hard drives), secure communication channels (e.g., Wi-Fi), and
various software applications.
➢ ECC (Elliptic Curve Cryptography)
• Working Principle: ECC is a public-key algorithm that uses the algebraic
structure of elliptic curves over finite fields. It is known for its compact key
sizes compared to RSA while maintaining a high level of security.
• Real-World Usage: Secure key exchange, digital signatures, and authentication
in various applications, including mobile devices and IoT devices.

DEPT OF CSE, GEC TALAKAL 5


Cryptography Technology

4.2 Real-World Usage Examples:


• Online Banking: RSA and AES are used to secure online transactions and protect
sensitive financial data.
• Secure Messaging: End-to-end encryption using algorithms like AES is used in
messaging applications to ensure privacy and confidentiality.
• Secure Websites: HTTPS uses RSA and AES to encrypt communication between web
browsers and servers, ensuring data security.
• Cloud Storage: AES is commonly used to encrypt data stored in cloud storage services.
• Digital Signatures: RSA and ECC are used to create digital signatures, verifying the
authenticity and integrity of digital documents.

4.3 Features Of Cryptography


• Confidentiality: Information can only be accessed by the person for whom it is
intended and no other person except him can access it.
• Data Integrity: Information cannot be modified in storage or transition between sender
and intended receiver without any addition to information being detected.
• Non-repudiation: The creator/sender of information cannot deny his intention to send
information at a later stage.
• Authentication: The identities of the sender and receiver are confirmed. As well
destination/origin of the information is confirmed.
• Interoperability: Cryptography allows for secure communication between different
systems and platforms.
• Adaptability: Cryptography continuously evolves to stay ahead of security threats and
technological advancements.

DEPT OF CSE, GEC TALAKAL 6


Cryptography Technology

CHAPTER 5
METHODOLOGY

Fig 5.1: Methodology

Symmetric Key Cryptography is a method of encryption where the same secret key is used for
both encrypting and decrypting the data. The process begins with plain text, which is the
original readable information. This plain text is encrypted using a symmetric encryption
algorithm like AES or DES, along with a secret key, resulting in cipher text. The cipher text
appears as random, unreadable characters, making it secure for storage or transmission over
networks. When the data needs to be read again, the cipher text is decrypted using the same
secret key, restoring the original plain text. The key to this method’s effectiveness is that both
the sender and receiver must securely share and maintain the same secret key, as anyone who
gains access to the key can decrypt the data. Symmetric encryption is known for being fast and
efficient, making it ideal for encrypting large volumes of data. However, it also faces challenges
in key distribution and management because if the key is compromised, the entire security of
the encrypted data is at risk. Popular symmetric encryption algorithms include AES (Advanced
Encryption Standard), DES (Data Encryption Standard), and 3DES (Triple DES).

DEPT OF CSE, GEC TALAKAL 7


Cryptography Technology

• Plain Text: It starts with the original readable data that needs to be protected.
• Encryption: The plain text is encrypted using a secret key and a symmetric encryption
algorithm like AES or DES.
• Cipher Text: After encryption, the data becomes cipher text, which appears scrambled and
unreadable to unauthorized users.
• Key Usage: The same secret key used for encryption must also be used for decryption,
ensuring that only those with the correct key can access the original information.
• Decryption: The cipher text is decrypted back into plain text using the same secret key and
symmetric algorithm.
• Security Dependency: The security of the entire process depends on keeping the secret key
safe and confidential.
• Efficiency: Symmetric encryption is fast and suitable for encrypting large amounts of data,
making it highly efficient in practice.
• Examples: Popular symmetric encryption algorithms include AES (Advanced Encryption
Standard), DES (Data Encryption Standard), and 3DES (Triple DES).
• Risk: If the secret key is compromised, the security of the data is completely broken,
highlighting the importance of secure key management.

DEPT OF CSE, GEC TALAKAL 8


Cryptography Technology

CHAPTER 6
ADVANTAGES AND DISADVANTAGES

ADVANTAGES:
1. Confidentiality: Cryptography ensures that only authorized individuals can access and
read sensitive data. By converting readable data into unreadable ciphertext, it protects
information from unauthorized access, especially during transmission over networks like
the internet.
2. Data Integrity: It helps maintain the integrity of data by detecting any unauthorized
alterations. Hash functions in cryptography ensure that even a small change in the original
message can be identified, preventing tampering and ensuring the data received is exactly
as sent.
3. Authentication: Cryptographic techniques allow users and systems to verify each other’s
identities. Through methods like digital certificates and signatures, it ensures that data or
communication is genuinely from the claimed sender and not from a malicious source.
4. Non-repudiation: This prevents a sender from denying their actions, such as sending a
message or completing a transaction. Digital signatures provide undeniable proof of
origin, which is critical in legal, financial, and business processes.

DISADVANTAGES:
1. Key Management Issues: Handling encryption keys securely is complex. Losing keys
can result in permanent data loss or unauthorized access.
2. Performance Impact: Encryption and decryption require processing power, which can
slow down system performance, especially in large-scale or real-time applications.
3. No Defense Against Insider Threats: Cryptography cannot stop authorized users from
misusing their access to sensitive data.
4. High Implementation Cost: Secure cryptographic systems often require costly
infrastructure, software, and skilled personnel.

DEPT OF CSE, GEC TALAKAL 9


Cryptography Technology

CHAPTER 7
APPLICATIONS

1. Secure Communication: Cryptography protects data transmitted over networks like


the internet through protocols such as HTTPS, VPNs, and encrypted emails.
2. Digital Signatures: Used to verify the authenticity of documents and messages,
ensuring they haven't been tampered with and confirming the sender's identity.
3. E-Commerce and Online Banking: Ensures secure online transactions, protecting
user credentials, credit card details, and transaction data.
4. Data Protection and Storage: Encrypts sensitive files, databases, and entire disks to
prevent unauthorized access to stored data.
5. Cryptocurrencies and Blockchain: Cryptography secures blockchain transactions,
protects wallets, and verifies digital asset ownership.
6. Authentication Systems: Enhances login systems by encrypting passwords and
supporting multi-factor authentication through secure protocols.

DEPT OF CSE, GEC TALAKAL 10


Cryptography Technology

CHAPTER 8
FUTURE SCOPE

Cryptography holds immense potential for the future as digital security becomes more critical
in an increasingly connected world. With the advent of quantum computing, traditional
cryptographic algorithms such as RSA and ECC are at risk of being broken, which is why the
development of post-quantum cryptography is gaining momentum. These new quantum-
resistant algorithms aim to safeguard data even in the era of powerful quantum machines.
Additionally, cryptographic technologies are evolving rapidly in the blockchain space, with
innovations like zero-knowledge proofs, homomorphic encryption, and secure multi-party
computation enhancing privacy, scalability, and trust in decentralized systems. Homomorphic
encryption, in particular, is expected to revolutionize cloud computing and artificial
intelligence by enabling data processing without compromising confidentiality. In the realm of
artificial intelligence and machine learning, cryptography plays a key role in ensuring privacy
through techniques such as federated learning and differential privacy. As billions of IoT
devices become part of daily life, lightweight cryptographic algorithms will be vital for secure
communication and device authentication. Moreover, with the rise of zero-trust security models
and decentralized identity systems, cryptographic methods like digital signatures and verifiable
credentials are set to redefine how identity and access are managed online. Quantum
cryptography, including technologies like quantum key distribution (QKD), will also become
increasingly relevant as quantum networks expand. Overall, the future of cryptography lies in
its ability to adapt to emerging threats, power new technologies, and ensure privacy and
security in the digital age.

DEPT OF CSE, GEC TALAKAL 11


CONCLUSION

Cryptography has emerged as a fundamental pillar of modern information security, playing a


vital role in safeguarding digital communication, protecting sensitive data, and maintaining
trust in online systems. Its principles and techniques form the backbone of secure
infrastructures across various sectors, including finance, healthcare, government, and military
operations. Through the use of symmetric and asymmetric encryption, hashing, and digital
signatures, cryptographic methods ensure confidentiality, integrity, authentication, and non-
repudiation of information. As technology continues to evolve, so do the threats and challenges
facing cryptographic systems. The rise of quantum computing, in particular, poses a significant
risk to current encryption standards, necessitating the development of quantum-resistant
algorithms and innovative approaches like post-quantum cryptography. Furthermore,
advancements such as homomorphic encryption and zero-knowledge proofs are expanding the
possibilities of secure data processing and privacy preservation. while cryptography has
achieved remarkable progress, its continued evolution is critical to staying ahead of emerging
security threats. Ongoing research, education, and global collaboration are essential to ensure
that cryptographic technology remains robust, efficient, and adaptable in an increasingly digital
and interconnected world.
REFERENCES
[1] N. Sharma, Prabhjot and H. Kaur, "A Review of Information Security using
Cryptography Technique," International Journal of Advanced Research in Computer
Science, vol. 8, no. Special Issue, pp.

[2] S. J. Lincke and A. Hollan, "Network Security: Focus on Security, Skills, and
Stability," in 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee.

[3] O. O. Khalifa, M. R. Islam, S. Khan and M. S. Shebani, "Communications


cryptography," in RF and Microwave Conference, RFM. Proceedings, Selangor.

[4] N. Jirwan, A. Singh and S. Vijay, "Review and Analysis of Cryptography Techniques,"
International Journal of Scientific & Engineering Research.

[5] N. Varol, F. Aydoğan and A. Varol, "Cyber Attacks Targetting Android Cellphones,"
in The 5th International Symposium on Digital Forensics and Security (ISDFS 2017),
Tirgu Mures.

[6] F. Piper and S. Murphy, Cryptography: A Very Short Introduction, London: Oxford
University Press.

[7] W. D. A. M. E. HELLMAN, "New directions in cryptography," IEEE Transactions on


Information Theory.

[8] O. Goldreich, Foundations of Cryptography Basic Tools, Cambridge: Cambridge


University Press.

You might also like