Ultimate Guide on Cryptography Technology


Yashicavashishtha1065

Uploaded on Mar 22, 2022

Category Education

PPT on Ultimate Guide on Cryptography Technology.

Category Education

Comments

                     

Ultimate Guide on Cryptography Technology

Click to edit Master title style CRYPTOGRAPHY TECHNOLOGY 1 ICnlticrokd tuoc etidoint Master title style • Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information. 2 2 Source: www.geeksforgeeks.org Clriycpkt toog readpiht yM taesctehrn otiltolgey style • In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a set of rule based calculations known as algorithms to convert messages in ways that make it hard to decode it. • These algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on internet and to protect confidential transactions such as credit card and debit card transactions. 3 3 Source: www.geeksforgeeks.org TCleickh ntioq uedesit uMsaesdt eFro rti tClrey spttyolgeraphy • In today’s age of computers cryptography is often associated with the process where an ordinary plain text is converted to cipher text which is the text made such that intended receiver of the text can only decode it and hence this process is known as encryption. 4 4 Source: www.geeksforgeeks.org Click to edit Master title style Features Of Cryptography 5 Cloinckfi dtoe netdiaitl iMtyaster title style • Information can only be accessed by the person for whom it is intended and no other person except him can access it. 6 6 Source: www.geeksforgeeks.org ICnlticekg rtioty edit Master title style • Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected. 7 7 Source: www.geeksforgeeks.org NCloicnk-r teop uedita tMioanster title style • The creator/sender of information cannot deny his or her intention to send information at later stage. 8 8 Source: www.geeksforgeeks.org CAluicthke tnot iecdaiti oMnaster title style • The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed. 9 9 Source: www.geeksforgeeks.org Click to edit Master title style Types Of Cryptography 10 SCylimckm teot reidci tK eMya sCtreyrp tiotlger asptyhlye • It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. • Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange key in a secure manner. • The most popular symmetric key cryptography system is Data Encryption System(DES). 1111 Source: www.geeksforgeeks.org HClaicshk Ftou necdtiito Mnsaster title style • There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords. 1122 Source: www.geeksforgeeks.org AClsiycmk mtoe etrdiict KMeays tCery tpitloeg rsatyplhey • Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. 1133 Source: www.geeksforgeeks.org