0% found this document useful (0 votes)
115 views21 pages

Cryptology

This document provides an overview of cryptology and cryptography. It discusses terminology related to cryptography including encryption, decryption, ciphers, and keys. It then covers the history of cryptography and different types of ciphers such as classical, substitution, and polyalphabetic ciphers. Modern cryptography concepts like symmetric-key cryptography, public-key cryptography, digital signatures, and cryptanalysis are also explained. Applications of cryptography like security for ATM cards, passwords, and e-commerce are mentioned.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views21 pages

Cryptology

This document provides an overview of cryptology and cryptography. It discusses terminology related to cryptography including encryption, decryption, ciphers, and keys. It then covers the history of cryptography and different types of ciphers such as classical, substitution, and polyalphabetic ciphers. Modern cryptography concepts like symmetric-key cryptography, public-key cryptography, digital signatures, and cryptanalysis are also explained. Applications of cryptography like security for ATM cards, passwords, and e-commerce are mentioned.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21

PAPER PRESENTATION

ON

CRYPTOLOGY
BY:K.Srinivas

CRYPTOLOGY
Cryptology

Also called as cryptography


From Greek , kryptos, "hidden, secret" Is the practice and study of hiding information

TERMINOLOGY

Encryption Decryption

Cipher and
Keys

HISTORY OF CRYPTOGRAPHY

The Ancient Greek scytale, probably much like this modern reconstruction, may have been one of the earliest devices used to implement a cipher

TYPES OF CIPHER

Classical ciphers Substitution ciphers

Polyalphabetic ciphers

EXAMPLES FOR CIPHERS

In Classical cipher type -

help me becomes ehpl em

In Substitution cipher type -fly at once

becomes gmz bu podf

POLYALPHABETIC CIPHERS

The Polyalphabetic ciphers were developed


by Leon Battista Alberti around the year 1467.

CREDIT CARD WITH SMART CARD

MODERN CRYPTOGRAPHY

Symmetric-Key cryptography Public-Key cryptography

Cryptanalysis
Cryptographic primitives

SYMMETRIC-KEY CRYPTOGRAPHY

Block cipher Example: AES and DES

Stream cipher
Example: RC4

PUBLIC-KEY CRYPTOGRAPHY

PUBLIC-KEY CRYPTOGRAPHY

Public-Key is also called as Asymmetrickey

The Public-Key is used for encryption and the Private-Key is used for decryption

DIGITAL SIGNATURE
A digital signature is an reminiscent of an ordinary signature. It uses two algorithms 1. Signing 2. Verification

PADLOCK ICON

CRYPTANALYSIS
The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion

CRYPTANALYTICAL ATTACKS

Cipher text-only attack Known-plaintext attack Chosen-plain text

CRYPTOSYSTEMS
Cryptographic primitives provide fundamental properties, which are used to develop more complex tools called cryptosystems or cryptographic protocols

APPLICATIONS

Security of ATM cards Computer passwords Electronic commerce

QUESTIONS

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy