0% found this document useful (0 votes)
8 views8 pages

Cryptography

about cryptography

Uploaded by

Vibhakar Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

Cryptography

about cryptography

Uploaded by

Vibhakar Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Cryptography

Cryptography is the practice of securing communication from


adversaries. Explore its history, algorithms, applications, and future
challenges.

Subbmited To: Subbmited by :


Bhupendra Ram
Vibhakar Sharma
MCA 1St year
Q id-23510080
Definition of Cryptography
1 Confidentiality 2 Integrity
Keep information hidden from Ensure that data is not modified
unauthorized access using or tampered with during
encryption techniques. transmission or storage.

3 Authentication
Verify the identity of the communicating parties and determine if they can be trusted.
History of Cryptography
1 In ancient times, secret codes like Caesar Cipher and Scytale were
used to send covert messages.

2 The development of the Enigma machine by the Germans during


World War II played a crucial role in motivating modern cryptography.

3 The advent of computers paved the way for the rise of powerful
encryption algorithms like RSA and AES.
Types of Cryptographic Algorithms
Symmetric Key Cryptography Asymmetric Key Cryptography
Both the sender and receiver use the same Also known as public-key cryptography, it
key to encrypt and decrypt the data. utilizes different keys for encryption and
decryption.
Applications of Cryptography

Secure Online PaymentsEncrypted Email Virtual Private


Network (VPN)
Protects financial Keeps the content of emails
transactions and sensitive private and hidden from Ensures secure
information using encryption unauthorized users. communication and
techniques. enhances privacy over
public networks.
Current Challenges and Future Trends
Quantum Computing Internet of Things Homomorphic
(IoT) Encryption
Presents a threat to
existing cryptographic Securing IoT devices Allows computation on
algorithms, highlighting poses unique challenges encrypted data without
the need for quantum- due to resource revealing the original
resistant encryption. constraints and the information, paving the
large-scale deployment. way for secure
outsourcing of data
processing.
CONCLUSION: EMBRACING CRYPTOGRAPHY

Cryptography plays a vital role in securing our digital world.


By understanding its history, techniques, and applications,
we can appreciate its significance in safeguarding sensitive
information and shaping the future of cybersecurity.
THANK YOU !

You might also like