0% found this document useful (0 votes)
40 views5 pages

First 17

The document discusses cryptographic algorithms and their uses. It defines cryptography as the art of secret writing and protecting information. It then describes the genealogy and types of cryptographic algorithms, including symmetric ciphers which use a single key for encryption and decryption, asymmetric ciphers which use separate keys for encryption and decryption, and authenticators which are hash functions that generate fixed-length outputs to authenticate messages. Symmetric ciphers are commonly used to protect data while asymmetric ciphers can also be used to authenticate data.

Uploaded by

Jean Paul Ize
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views5 pages

First 17

The document discusses cryptographic algorithms and their uses. It defines cryptography as the art of secret writing and protecting information. It then describes the genealogy and types of cryptographic algorithms, including symmetric ciphers which use a single key for encryption and decryption, asymmetric ciphers which use separate keys for encryption and decryption, and authenticators which are hash functions that generate fixed-length outputs to authenticate messages. Symmetric ciphers are commonly used to protect data while asymmetric ciphers can also be used to authenticate data.

Uploaded by

Jean Paul Ize
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 5

CRYPTOGRAPHIC ALGORITHMS Presenter JEAN PAUL NIZEYIMANA No 17 INTRODUCTION

The art of secret writing The art of protection using information The science of encrypting or hiding secrets Needed for confidentiality (http://en.wikipedia.org/wiki/Cryptography)
What is a Cipher or Crypto-algorithm ?

A method or system for transforming given information in order to conceal its meaning.

Algorithms Genealogy Algorithms

Ciphers

Authenticators

Symmetric

Asymmetric

DES\3DES AES IDEA RC6 BlowFish

RSA ELGAMAL

SHA MD5

Symmetric Ciphers

A single key for encryption and decryption operations.

More the number of bits of key, more secure your data.


Algorithms are usually characterized as stream or block ciphers. Used generally for protecting data.

Asymmetric Ciphers

One key for encryption and another key for decryption operation.

More the distance between mutually prime nos. (here they are key), more secure your data.
Used generally for protecting data as well for making sure its authentication.

Authenticators

Hash functions gives a fixed-length output for a arbitrary-length message.

Strength of algorithm is measured by collision resistance.


Authentication is achieved by re-computing hash and compared with stored hash value.

You might also like