0% found this document useful (0 votes)
94 views20 pages

(MBA Integrated 5 Sem) : Richa Rawat

The document discusses cryptography and its basic terms and categories. It describes cryptography as the science of securing messages through encryption and decryption. The key types discussed are symmetric key cryptography, where the same key is used by sender and receiver, and asymmetric key cryptography, also known as public key cryptography, where different keys are used for encryption and decryption. It compares the two approaches and lists some applications of cryptography like defense services, e-commerce, and data security.

Uploaded by

Aarav Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views20 pages

(MBA Integrated 5 Sem) : Richa Rawat

The document discusses cryptography and its basic terms and categories. It describes cryptography as the science of securing messages through encryption and decryption. The key types discussed are symmetric key cryptography, where the same key is used by sender and receiver, and asymmetric key cryptography, also known as public key cryptography, where different keys are used for encryption and decryption. It compares the two approaches and lists some applications of cryptography like defense services, e-commerce, and data security.

Uploaded by

Aarav Arora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

RICHA RAWAT

(MBA integrated
5 sem)

SAKY DMS BHIMTAL


SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION & DECRYPTION
CATEGORIES OF CYRPTOGRAPHY
COMPARISON
CONCLUSION

SAKY DMS BHIMTAL


SAKY DMS BHIMTAL
CONFIDENTIALITY

SECURE

NON-REPUDIATION

SAKY DMS BHIMTAL


Cryptography is the
science and art of
transforming messages
to make them secure
and immune to attack.

SAKY DMS BHIMTAL


PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION & DECRYPTION
KEYS

SAKY DMS BHIMTAL


SAKY DMS BHIMTAL
SYMMETRIC KEY ASYMMETRIC KEY
CRYPTOGRAPHY CRYPTOGRAPHY

SAKY DMS BHIMTAL


Also known as secret key. Sender & receiver
uses same key & an encryption/decryption
algorithm to encrypt/decrypt data. i.e. the key
is shared.

SAKY DMS BHIMTAL


RECEIVER

SECRET KEY

ENCRYPTION DECRYPTION
CIPHERTEXT

SAKY DMS BHIMTAL


SUBSTITUTION TRANSPOSITION
CIPHER CIPHER

SAKY DMS BHIMTAL


A substitution technique is one in which the
letters/number/symbols of plaintext are
replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6

SAKY DMS BHIMTAL


In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with one
another.
1 2 3 4 5 6 4 2 1 6 3 5
M E E T M E
T E M E E M
A F T E R P
E F A P T R
A R T Y
Y R A T

Plain text: MEET ME AFTER PARTY


Cipher text: TEMEEMEFAPTRYRAT
KEY USED: 421635

SAKY DMS BHIMTAL


Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC &
PRIVATE respectively.

SAKY DMS BHIMTAL


RECEIVER

PUBLIC KEY PRIVATE KEY

ENCRYPTION DECRYPTION
CIPHERTEXT

SAKY DMS BHIMTAL


SYMMETRIC KEY
CRYPTOGRAPHY

SAKY DMS BHIMTAL


SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1) The same algorithm with the 1)One algorithm is used for
same key is used for encryption and decryption with
encryption and decryption. a pair of keys, one for
encryption and one for
2) The key must be kept secret. decryption.

2)One of the two keys must be


3)It may be impossible or at kept secret.
least impractical to decipher a
message if no other information 3)It may be impossible or at
is available. least impractical to decipher a
message if no other information
is available.

SAKY DMS BHIMTAL


Defense services
Secure data manipulation
E commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security

SAKY DMS BHIMTAL


By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, access control
and availability of data is maintained.

SAKY DMS BHIMTAL


SAKY DMS BHIMTAL

You might also like