0% found this document useful (0 votes)
33 views7 pages

Data Comm Presentation - IV

This document provides an overview of cryptography. It discusses how cryptography uses algorithms to keep confidential data secret and uncrackable by unauthorized parties. The document then defines cryptography, its main purposes, and the basic ways it works. It distinguishes between symmetric and asymmetric cryptography, describing their relative security, speed, and key structures. Specifically, it notes that asymmetric cryptography uses public/private key pairs to encrypt and decrypt messages securely over the internet. The document also briefly introduces hash codes and their use in verifying data integrity.

Uploaded by

Neha Panki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views7 pages

Data Comm Presentation - IV

This document provides an overview of cryptography. It discusses how cryptography uses algorithms to keep confidential data secret and uncrackable by unauthorized parties. The document then defines cryptography, its main purposes, and the basic ways it works. It distinguishes between symmetric and asymmetric cryptography, describing their relative security, speed, and key structures. Specifically, it notes that asymmetric cryptography uses public/private key pairs to encrypt and decrypt messages securely over the internet. The document also briefly introduces hash codes and their use in verifying data integrity.

Uploaded by

Neha Panki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Presentation - IV

Topic - Cryptography

Vishal Kulkarni , BMSCE Bangalore


What is this Crypto Graphy .?

Purpose of doing it ?

Ways of doing it ?

Any ancient connectivity ?

What is public and private key ?

What is Hash Code. ?


Cryptography is all about using algorithms that gives secrecy to the important
confidential data and makes it uncrackable by hacker or any unwanted third
party.
Crypto means Hidden secret and Graphy implies to Writing
Main intensions of Cryptography are
Data Confidentiality
Data integrity ----Checked by Hash code
Authentication
Non Repudiation
Plain text Cipher Ciphered text

- The Operation of ciphering is mainly controlled by different cryptography


algorithms and key pattern

-The Modern day cryptosystem is classified into two


a) Symmetric cryptography
b) Asymmetric cryptography

- The Kautilyam and Mulavediya were two cryptosystems described in ancient `


literatures .
Symmetric type
- Less assurance of security
-Less complicated and More faster
- It again has subtypes as Block Cyphering and Stream Cyphering
- Needs only one key

Asymmetric type
-Highly assured security over internet
-More complicated and Slower
-Requires Two keys (Public key and Private key)
- Any internet user gets a private and public key for himself where public key can
be broadcasted or can be thrown openly in network keeping the private key very
safely which is utilized for decrypting the data that came encrypted using the his
own public key.

- Both Public and Private keys of a user are mathematically related , but private key
can not be calculated having public key.

- Both are interchangeable.

- Apart from these Data Integrity or Data Tampering is checked by using Hash Code
which is a digital fingerprint of any data. --- Version MD5 use 52 bit key
Thank you

You might also like