0% found this document useful (0 votes)
20 views16 pages

UNIT3

Cryptography is the process of converting plaintext into ciphertext for secure communication, utilizing methods such as symmetric and asymmetric key cryptography. It plays a crucial role in various applications including data security, authentication, and blockchain technology. However, challenges such as key management, quantum computing threats, and legal issues need to be addressed to ensure effective cryptographic practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views16 pages

UNIT3

Cryptography is the process of converting plaintext into ciphertext for secure communication, utilizing methods such as symmetric and asymmetric key cryptography. It plays a crucial role in various applications including data security, authentication, and blockchain technology. However, challenges such as key management, quantum computing threats, and legal issues need to be addressed to ensure effective cryptographic practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

CRYPTOGRAPHY

Understanding Encryption, Decryption, and


Application
What is Cryptography?

Cryptography in short can be defined as the process on converting plan


text into cipher text using some encryption algorithm at the sender’s
side and converting cipher text into plain text at the receiver’s end.
Plaintext, Ciphertext, Key,
Encryption, Decryption
■ Plaintext : The original, readable message before
encryption.
■ Ciphertext : The encrypted message that is unreadable
without decryption.
■ Key : A secret value used in encryption and decryption
process.
■ Encryption : A process of converting plaintext into
ciphertext to protect information.
■ Decryption : The process of converting ciphertext back
into plaintext using a key.
Types of Cryptography

There are three types of cryptography as shown in the flowchart below:


Symmetric Key Cryptography

Definition: A cryptographic method


where the same key is used for both
encryption and decryption. It is fast
but requires secure key sharing.
Working Mechanism
1. Key Generation
2. Encryption
3. Transmission (the ciphertext is
sent over the communication
channel)
4. Decryption
Asymmetric Key Cryptography

Definition: A cryptographic method


using a public key for encryption and
private key for decryption, ensuring
secure communication.
Working Mechanism
1. A public-private key pair is generated.
2. The sender encrypt plaintext using
the receiver’s public key.
3. The ciphertext is transmitted securely.
4. The receiver decrypts it using their
private key.
Hash Function

Definition: A mathematical function that converts input data into a fixed


size string (hash), ensuring data integrity and security
Importance
1. Data integrity
2. Security
3. Efficiency
4. Uniqueness
Applications of Cryptography

■ Data security
■ Secure communication
■ Authentication
■ E-commerce and online banking
■ Cryptocurrencies
■ Password protection
■ Cloud security
■ Digital rights management
Digital Signatures

Authentication : Confirms the identity of a user or system (e.g., password, biometrics,


digital signatures).
Integrity : Ensures data remains unchanged and unaltered during transmission or
storage
HOW IT WORKS
1. Authentication
■ User provide credentials.
■ The system verifies them against stored data.
2. Integrity
■ A hash function generates a unique hash of the data.
■ On receiving, the hash is recalculated and compare to detect tampering.
Blockchain and Cryptography

Role of cryptography in blockchain


1. Secure Transactions : Ensures data privacy and protection.
2. Hash Function : Maintains data integrity by linking blocks securely.
3. Digital Signatures : Verifies users identity and prevent fraud.
4. Consensus Mechanisms : Uses cryptographic algorithm for validation.
5. Decentralisation Security : Protects blockchain data from tampering
and attacks.
Cryptography in cloud security
Data encryption in cloud storage
Definition : Encrypting data before storing it in the cloud to ensure security and prevent
unauthorised access
How it works
1. Data encryption: Data is encrypted using algorithms.
2. Secure Transmission: Encrypted data is sent over a secure channel.
3. Storage Encryption: Cloud providers may use additional encryption for stored data.
4. Decryption: Only authorised user with the correct key can decrypt and access the
data.
Benefits:
■ Protects sensitive information from breaches.
■ Ensures compliance with data security regulations.
■ Prevents unauthorised access, even if data is stolen.
End to end encryption

Definition : A security method where only the sender and recipient can
decrypt the message, ensuring privacy and preventing third party access.
How it works
1. The sender encrypt the message.
2. The encrypted message is transmitted.
3. The recipient decrypts the message using key.
Benefits:
■ Ensures privacy and data security.
■ Prevents unauthorised access or eavesdropping.
Common cryptographic
algorithms
1. AES (Advanced Encryption Standard): widely used for encrypting
data.
2. RSA ( Rivest-Shamir-Adleman): Common for secure data
transmission and digital signatures.
3. SHA (Secure Hash Algorithm): Used for generating hash values.
4. ECC (Elliptic Curve Cryptography): Popular for securing mobile
devices, digital signatures, and blockchain technology.
5. TLS/SSL (Transport Layer Security/Secure Sockets Layer):
Secures communication over the internet.
Challenges in cryptography

1. Key Management: secure handling of keys is critical.


2. Quantum Computing: threatens current encryption methods.
3. Side channel attacks: exploiting physical data leaks.
4. Scalability: Cryptography must work efficiently at large scales.
5. Implementation flaws: poor coding can introduce vulnerabilities.
6. Post Quantum cryptography: need for quantum resistant
algorithms.
7. Legal issues: cryptography faces regulatory challenges.
Conclusion

■ Cryptography is vital for securing digital communication and data


■ Challenges like key management, implementation flaws, and quantum
computing must be addressed.
■ Ongoing research and innovation are essential to stay ahead for
emerging threats.

You might also like