0% found this document useful (0 votes)
61 views11 pages

E - Commerce: Submitted To Anshita Raj

Cryptography is the practice of hiding information by converting it into an unintelligible form. It provides confidentiality, integrity, and accuracy of data. Cryptography involves encrypting plaintext into ciphertext using a key, and decrypting it back using the same key. The main purposes of cryptography are authentication, privacy, integrity, and non-repudiation. Encryption is a form of cryptography that scrambles plaintext into ciphertext using keys and encryption algorithms. There are two main types of encryption - symmetric which uses a single secret key, and asymmetric which uses two separate keys - a public key and a secret key. A secret key, also known as a private key, is the piece of information used to encrypt and decrypt messages in

Uploaded by

abhhi yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views11 pages

E - Commerce: Submitted To Anshita Raj

Cryptography is the practice of hiding information by converting it into an unintelligible form. It provides confidentiality, integrity, and accuracy of data. Cryptography involves encrypting plaintext into ciphertext using a key, and decrypting it back using the same key. The main purposes of cryptography are authentication, privacy, integrity, and non-repudiation. Encryption is a form of cryptography that scrambles plaintext into ciphertext using keys and encryption algorithms. There are two main types of encryption - symmetric which uses a single secret key, and asymmetric which uses two separate keys - a public key and a secret key. A secret key, also known as a private key, is the piece of information used to encrypt and decrypt messages in

Uploaded by

abhhi yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

SHRI RAMSWAROOP MEMORIAL UNIVERSITY

E - commerce
Submitted by – Abhishek yadav
Roll no- 201910101120008

Submitted To Anshita Raj


What is Cryptography ?
Cryptography derived its name from a Greek word called
“krypto's" which means "Hidden Secrets". Cryptography
is the practice and study of hiding information. It is the
Art and Science of converting a plain intelligible data into
an unintelligible data and again retransforming that
message into its original form. It provides
Confidentiality , Integrity and Accuracy.
Important terms in cryptography
• Plaintext
• Encryption
• Cipher text
• Decryption
• key
• Cryptanalysis
• Cryptographers
• Cryptanalysts
• Cryptology
Purpose Of Cryptography
• Authentication: The process of proving one’s identity.
(The primary forms of host-to-host authentication on
the Internet today are name-based or address-based,
both of which are notoriously weak.)
• Privacy/Confidentiality: Ensuing that no one can read
the message except the intended receiver.
• Integrity: Assuring the receiver that the received
message has not been altered in any way from the
original.
• Non-repudiation: A mechanism to prove that the
sender really sent this message.
What is Encryption?

Encryption is a form of cryptography that “scrambles” plain text into


unintelligible cipher text. Encryption is the foundation of such security
measures as digital signatures, digital certificates, and the PKI that uses
these technologies to make computer transactions more secure.
Computer-based encryption techniques use keys to encrypt and decrypt
data. A key is a variable (sometimes represented as a password) that is a
large binary number—the larger, the better. Key length is measured in
bits, and the more bits in a key, the more difficult the key will be to
“crack.”
• The key is only one component in the encryption
process. It must be used in conjunction with an
encryption algorithm (a process or calculation) to
produce the cipher text. Encryption methods are usually
categorized as either symmetric or asymmetric,
depending on the number of keys that are used. We
discuss these two basic types of encryption technology
in the following sections.
Types of Encryptions

Symmetric
Asymmetric
• Hash
SECRET KEY 🔑
A secret key is the piece of information or
parameter that is used to encrypt and decrypt
messages in a symmetric, or secret-key,
encryption.
In assymetric encryption, two separate keys are
used. One is a public key and the other is a secret
key.
• A secret key may also be known as a private key.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy