Вы находитесь на странице: 1из 18

CRYPTOGRAPHY

Hiding the Word

What the CRYPTOGRAPHY is?

Cryptography is the science of providing security for information.

The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher the message into plain text. Cipher Text can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.

Everyone has secrets; some have more than others. When it becomes necessary to transmit those secrets from one point to another, it's important to protect the information while it's in transit. Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination.

Its Foundation or From where it came?


It is derived from Greek word kryptos and logos which means hidden and word. As all want a concealed & covert communication of their task. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy because it's effective and free.

Encryption & Decryption


Data that can be read and understood without any special measures is called plaintext or cleartext. The method of disguising plaintext in such a way as to hide its substance is called encryption Encrypting plaintext results in unreadable gibberish called The process of reverting ciphertext to its original plaintext is called decryption.

ciphertext

Categorization:
Keys: A key is a value that works with a cryptographic algorithm to produce a specific ciphertext. Keys are basically really, really, really big numbers. Key size is measured in bits; the number representing a 1024-bit key is darn huge. In public key cryptography, the bigger the key, the more secure the ciphertext. On this basis Cryptography is classified as :-

Public key Private key..

Private key!! or Conventional key!!

Private key!!
or

Conventional key!!

Conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for encryption and decryption. The Data Encryption Standard (DES) is an example of a conventional cryptosystem that is widely employed by the Federal Government

Public key!!
Anyone can see!!

Public key!!

The problems of key distribution are solved by public key cryptography,the concept of which was introduced by Whitfield Diffie and Martin Hellman in 1975. Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public key, which encrypts data, and a corresponding private, or secret key for decryption. As, You publish your public key to the world while keeping your private key secret. Anyone with a copy of your public key can then encrypt information that only you can read. Even people you have never met.

conventional cryptography was once the only available means for relaying secret information, the expense of secure channels and key distribution relegated its use only to those who could afford it, such as governments and large banks (or small children with secret decoder rings). Public key encryption is the technological revolution that provides strong cryptography to the adult masses.

Public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. The need for communications involve only public keys, and no private key is ever transmitted or shared. Some examples of public-key cryptosystems are RSA ,DiffieHellman and DSA, the Digital Signature Algorithm

Digital signatures
A major benefit of public key cryptography is that it provides a method for employing digital signatures. Digital signatures enable the recipient of information to verify the authenticity of the informations origin, and also verify that the information is intact.

Secured Digital Signature:


The system described above has some problems. It is slow, and it produces an enormous volume of data - at least double the size of the original information. An improvement on the above scheme is the addition of a one-way hash function in the process. A one-way hash function takes variable-length input - in this case, a message of any length, even thousands or millions of bits - and produces a fixedlength output; say, 160-bits. The hash function ensures that, if the information is changed in any way - even by just one bit - an entirely different output value is produced.

Advantage
High level security..

High Integrity

No unauthorized use. No trespassing..

Exploit
Banking purpose.. Credit Card A.T.M Government agencies Military forces

CONCLUSION
Provides data security.
Reduces the risk of intruders. Avoid risk of getting disrupted data.

ANY QUERIES??

THANK YOU !!!!


HAVE A NICE TIME!!!!!!

Вам также может понравиться