Shreyansh-Singh PPT
Shreyansh-Singh PPT
Shreyansh-Singh PPT
Seminar Presentation
on
CRYPTOGRAPHY
Presented By:
Name – SHREYANSH SINGH
(Roll no. - 2021021073)
Email: [email protected]
Contents
• Introduction
• What is Cryptography?
• Purpose Of cryptography
• Architecture of cryptography
• Types of Cryptography
• Process of cryptography
• Types Of cryptography Algorithms
• Conclusion
• References
* Side 2
INTRODUCTION
The Internet or the global Internet is the internationally connected
network of computer networks with addresses that are
administrated by IANA (Internet address and Naming Authority).
There are many aspects to security and many applications, ranging
from secure commerce and payments to private communications
and protecting passwords. One essential aspect for secure
communications is that of cryptography.
What is Cryptography?
Cryptography derived its name from a Greek word called
“krypto’s” which means “Hidden Secrets”.
Cryptography is the practice and study of hiding information. It is
the Art or Science of converting a plain intelligible data into an
unintelligible data and again retransforming that message into its
original form.
It provides Confidentiality, Integrity, and Accuracy.
PURPOSE OF CRYPTOGRAPHY
Authentication: The process of proving one's identity. (The
primary forms of host-to-host authentication on the Internet
today are name-based or address-based, both of which are
notoriously weak.)
Privacy/confidentiality: Ensuring that no one can read the
message except the intended receiver.
Integrity: Assuring the receiver that the received message has
not been altered in any way from the original.
Non-repudiation: A mechanism to prove that the sender really
sent this message.
Architecture of cryptography
Types of Cryptography
One of the keys allocated to each person is called the "public key",
and is published in an open directory somewhere where anyone can
easily look it up, for example by email address.
Each entity has 2 keys:
Private Key (a secret)
Public key (well known).
Using Keys
• Private keys are used for decrypting.
• Public keys are used for encrypting.
Process of cryptography
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Public/Private Key Cryptography
www.study.org
www.google.com
www.wikipedia.com
Thanks…!!!