100% found this document useful (1 vote)
278 views13 pages

Modern Cryptography: Shafia Gul Laiba Zahoor Faizan Khan

Modern cryptography involves techniques for secure communication including encryption, decryption, and cryptographic algorithms. There are five primary functions of cryptography: privacy, authentication, integrity, non-repudiation, and key exchange. The main types of cryptographic algorithms are secret key cryptography, public key cryptography, and hash functions. Secret key cryptography uses a single key for encryption and decryption while public key cryptography uses different keys. Hash functions create fixed-length outputs to ensure integrity without decrypting messages. Cryptography has many applications including password protection, encryption protocols, and digital signatures.

Uploaded by

Shafia Gul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
278 views13 pages

Modern Cryptography: Shafia Gul Laiba Zahoor Faizan Khan

Modern cryptography involves techniques for secure communication including encryption, decryption, and cryptographic algorithms. There are five primary functions of cryptography: privacy, authentication, integrity, non-repudiation, and key exchange. The main types of cryptographic algorithms are secret key cryptography, public key cryptography, and hash functions. Secret key cryptography uses a single key for encryption and decryption while public key cryptography uses different keys. Hash functions create fixed-length outputs to ensure integrity without decrypting messages. Cryptography has many applications including password protection, encryption protocols, and digital signatures.

Uploaded by

Shafia Gul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Modern

SHAFIA GUL
Cryptography LAIBA ZAHOOR
FAIZAN KHAN
> DEFININITION

> TYPES OF
CRYPTOGRAPHY
> SCOPE OF
CRYPTOGRAPHY
1
MODERN
CRYPTOGRAPHY
“Cryptography is the practice and
study of techniques for secure
communication in the presence of third
parties called adversaries”.
• Encryption
• “Until modern times, cryptography
referred almost exclusively to encryption,
which is the process of converting
ordinary information called plaintext into
unintelligible form called ciphertext.”

2
Insert or Drag & Drop Photo

3
FUNCTIONS OF
CRYPTOGRAPHY:
. There are five primary functions of cryptography today

1. Privacy/confidentiality: Ensuring that no one can read


the message except the intended receiver.

2. Authentication: The process of proving one's identity.

3. Integrity: Assuring the receiver that the received message


has not been altered in any way from the original.

4 .Non-repudiation: A mechanism to prove that the sender


really sent this message.

5 .Key exchange: The method by which crypto keys are


shared between sender and receiver. 4
TYPES OF CRYPTOGRAPHIC
ALGORITHMS
The three types of algorithms that will be discussed are

 Secret key cryptograohy


 Public key cryptography
 Hash Functions

5
Secret Key Cryptography
 “Secret key cryptography methods employ a single key for both encryption and
decryption.”
 The sender uses the key to encrypt the plaintext and sends the cipher text to the receiver. The
receiver applies the same key to decrypt the message and recover the plaintext. Because a single
key is used for both functions, secret key cryptography is also called symmetric encryption.

7
Public Key Cryptography
 “In cryptography ,a public key is a large numerical
value that is used to encrypt data ”.
 The key can be generated by a software program but
more often it is provided by a trusted design authority
and made available to every one through a publically
accessible repository or directory.

8
HASH FUNCTIONS
 Hash functions, also called message digests and one-way
encryption, are algorithms that, in essence, use no key .
 Instead, a fixed-length hash value is computed based
upon the plaintext that makes it impossible for either the
contents or length of the plaintext to be recovered.
 Hash functions, then, provide a mechanism to ensure the
integrity of a file.
Scope of cryptography
 Password Protection
 Pretty Good Privacy (PGP)
 IP Security (IPsec) Protocol
 Secure Transactions with SSL and TLS
 Elliptic Curve Cryptography (ECC)
 The Advanced Encryption Standard (AES)
 Cisco's Stream Cipher
 Encrypting File System (EFS)
 Some of the Finer Details of RC4
 Challenge-Handshake Authentication Protocol
(CHAP)
 Secure E-mail and S/MIME

9
CONCLUSION:
i. Cryptography is a particularly interesting field because of the amount of work
that is, by necessity, done in secret.
ii. The irony is that secrecy is not the key to the goodness of a cryptographic
algorithm.
iii. Regardless of the mathematical theory behind an algorithm, the best algorithms
are those that are well-known and well-documented because they are also well-
tested and well-studied! In fact, time is the only true test of good cryptography;
any cryptographic scheme that stays in use year after year is most likely a good
one.
iv. The strength of cryptography lies in the choice (and management) of the keys;
longer keys will resist attack better than shorter keys

10
THANKS

12

You might also like