Modern Cryptography: Shafia Gul Laiba Zahoor Faizan Khan
Modern Cryptography: Shafia Gul Laiba Zahoor Faizan Khan
SHAFIA GUL
Cryptography LAIBA ZAHOOR
FAIZAN KHAN
> DEFININITION
> TYPES OF
CRYPTOGRAPHY
> SCOPE OF
CRYPTOGRAPHY
1
MODERN
CRYPTOGRAPHY
“Cryptography is the practice and
study of techniques for secure
communication in the presence of third
parties called adversaries”.
• Encryption
• “Until modern times, cryptography
referred almost exclusively to encryption,
which is the process of converting
ordinary information called plaintext into
unintelligible form called ciphertext.”
2
Insert or Drag & Drop Photo
3
FUNCTIONS OF
CRYPTOGRAPHY:
. There are five primary functions of cryptography today
5
Secret Key Cryptography
“Secret key cryptography methods employ a single key for both encryption and
decryption.”
The sender uses the key to encrypt the plaintext and sends the cipher text to the receiver. The
receiver applies the same key to decrypt the message and recover the plaintext. Because a single
key is used for both functions, secret key cryptography is also called symmetric encryption.
7
Public Key Cryptography
“In cryptography ,a public key is a large numerical
value that is used to encrypt data ”.
The key can be generated by a software program but
more often it is provided by a trusted design authority
and made available to every one through a publically
accessible repository or directory.
8
HASH FUNCTIONS
Hash functions, also called message digests and one-way
encryption, are algorithms that, in essence, use no key .
Instead, a fixed-length hash value is computed based
upon the plaintext that makes it impossible for either the
contents or length of the plaintext to be recovered.
Hash functions, then, provide a mechanism to ensure the
integrity of a file.
Scope of cryptography
Password Protection
Pretty Good Privacy (PGP)
IP Security (IPsec) Protocol
Secure Transactions with SSL and TLS
Elliptic Curve Cryptography (ECC)
The Advanced Encryption Standard (AES)
Cisco's Stream Cipher
Encrypting File System (EFS)
Some of the Finer Details of RC4
Challenge-Handshake Authentication Protocol
(CHAP)
Secure E-mail and S/MIME
9
CONCLUSION:
i. Cryptography is a particularly interesting field because of the amount of work
that is, by necessity, done in secret.
ii. The irony is that secrecy is not the key to the goodness of a cryptographic
algorithm.
iii. Regardless of the mathematical theory behind an algorithm, the best algorithms
are those that are well-known and well-documented because they are also well-
tested and well-studied! In fact, time is the only true test of good cryptography;
any cryptographic scheme that stays in use year after year is most likely a good
one.
iv. The strength of cryptography lies in the choice (and management) of the keys;
longer keys will resist attack better than shorter keys
10
THANKS
12