Вы находитесь на странице: 1из 10

A project report on

Cryptography

Guided by Submitted by
Ms. Shikha gupta Mr. Rahul patel
Mr. Akalesh nayak
Contents
 Security in computer networking
 Cryptography and its components
 Categories of cryptography
 Symmetric cryptography
 Asymmetric cryptography
 Advantages
 Application
Security in data communication and
computer networking is based on

Cryptography
Cryptography components
 Sender
 Encryption
 Decryption
 plaintext
 Ciphertext
 Receiver
Categories of cryptography
Symmetric key cryptography
 In symmetric key cryptography ,the same
key is used by both parties .
 The sender uses this key to encrypt data
and receiver uses decrypt data.
Asymmetric key cryptography

 In asymmetric key cryptography, there are two


keys ..
1. Private key
2. Public key
Advantages

 No chance of illegal uses of our private


data after hacking by another person.
 After transmitting data by the sender ,it
can be read or listen or watched by main
receiver.
 This technique is very special in
commercial field.
Application
 It is mostly used in IT and CS field
due to their secret writing .
 In banking and some national
purposes.
 It is also used in other commercial
fields.
Thank You

Вам также может понравиться