Cryptology
Cryptology
ON
CRYPTOLOGY
BY:K.Srinivas
CRYPTOLOGY
Cryptology
TERMINOLOGY
Encryption Decryption
Cipher and
Keys
HISTORY OF CRYPTOGRAPHY
The Ancient Greek scytale, probably much like this modern reconstruction, may have been one of the earliest devices used to implement a cipher
TYPES OF CIPHER
Polyalphabetic ciphers
POLYALPHABETIC CIPHERS
MODERN CRYPTOGRAPHY
Cryptanalysis
Cryptographic primitives
SYMMETRIC-KEY CRYPTOGRAPHY
Stream cipher
Example: RC4
PUBLIC-KEY CRYPTOGRAPHY
PUBLIC-KEY CRYPTOGRAPHY
The Public-Key is used for encryption and the Private-Key is used for decryption
DIGITAL SIGNATURE
A digital signature is an reminiscent of an ordinary signature. It uses two algorithms 1. Signing 2. Verification
PADLOCK ICON
CRYPTANALYSIS
The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion
CRYPTANALYTICAL ATTACKS
CRYPTOSYSTEMS
Cryptographic primitives provide fundamental properties, which are used to develop more complex tools called cryptosystems or cryptographic protocols
APPLICATIONS
QUESTIONS
THANK YOU