0% found this document useful (0 votes)
11 views10 pages

Cryptology and Digital Signature

Cryptography is the art of secret writing that allows information to be hidden from all except those intended to see it. There are two main types of cryptography: symmetric cryptography which uses a single key for both encryption and decryption, and asymmetric cryptography which uses two different keys, a public key for encryption and a private key for decryption. Cryptography has many uses in modern technology including ATM cards, computer passwords, and electronic commerce.

Uploaded by

Chandni Parikh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

Cryptology and Digital Signature

Cryptography is the art of secret writing that allows information to be hidden from all except those intended to see it. There are two main types of cryptography: symmetric cryptography which uses a single key for both encryption and decryption, and asymmetric cryptography which uses two different keys, a public key for encryption and a private key for decryption. Cryptography has many uses in modern technology including ATM cards, computer passwords, and electronic commerce.

Uploaded by

Chandni Parikh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Cryptology and Digital Signature

Presented by: Chandni Parikh Kalyani maraviya

cryptography

Meaning
Cryptography is the art or science of secret writing, or more exactly, of storing information in a form which allows it to be revealed to those you wish to see it yet hides it from all others.

Terminologies
The original information to be hidden is called "plaintext". The hidden information is called "cipher text". Encryption is any procedure to convert plaintext into cipher text. Decryption is any procedure to convert cipher text into plaintext.

Example
. A simple example is to assign each letter a progressively higher number, where A=1, B=2, and so forth. Using this formula for example, the word Management", once encrypted, would read 13 1 14 1 7 5 13 5 14 20".

Uses of cryptography
ATM cards Computer Passwords Electronic commerce

Types of cryptography
Secret key (or symmetric) cryptography Public-key (or asymmetric) cryptography

Secret key (or symmetric) cryptography


In secret key cryptography, a single key is used for both encryption and decryption. The sender uses the key to encrypt the plaintext and sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext.

Public-key (or asymmetric) cryptography


In Public-key (or asymmetric) cryptography, two different keys are used for both encryption and decryption. One of the keys is designated the public key and may be advertised as widely as the owner wants. The other key is designated the private key and is never revealed to another party.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy