UNIT 3-Cryptography
UNIT 3-Cryptography
•Reporter
01 Introduction to Cryptography
02 Substitution Techniques
03 Steganography
CONTENTS
04 Symmetric Cryptography
05 Asymmetric Cryptography
What is Cryptography?
Cryptography is the practice and study of techniques
for securing communication and information from
adversaries. It involves creating codes and systems
that protect data, ensuring that only authorized
users can access or manipulate it.
Historical Context
The history of cryptography dates back to ancient
civilizations, where simple ciphers were used to
secure military communications. Over time, it
evolved to include complex mathematical
algorithms, playing a crucial role in World Wars and
Modern Applications
beyond.
Today, cryptography underpins security in digital
communications, e-commerce, and data protection.
It is essential for online banking, email security, and
privacy in applications like messaging services and
social networks.
Key Concepts
Authentication
Authentication verifies the identity of a user or
system. It can be achieved through various
methods, such as passwords, biometric data, or
digital certificates, ensuring that only legitimate
users can access resources.
Integrity
Integrity involves ensuring that data is accurate
and unaltered during transmission or storage.
Hash functions and checksums are commonly
used to detect any modifications or corruption in
the data.
Confidentiality
Confidentiality ensures that information is only
accessible to those who have the right to see it.
Techniques such as encryption help maintain
this aspect, protecting sensitive data from
unauthorized access.
02 Substitution Techniques
Overview of Substitution
What are Substitution Techniques?
Vigenère Cipher
The Vigenère cipher uses a keyword to shift
letters in a way that creates a polyalphabetic
substitution. It improves security over simple
substitution by combining multiple Caesar
ciphers, making it harder to break.
03 Steganography
Understanding Steganography
01 02 03
What is Symmetric Key Distribution Common Symmetric
Cryptography? Challenges Algorithms
Data Encryption
Symmetric cryptography is widely used for encrypting
01 sensitive data, such as personal information and
financial transactions, ensuring that unauthorized
parties cannot access or read the information.
Network Security
In network security, protocols like IPsec and SSL/TLS
02 utilize symmetric encryption to secure
communications over the internet, protecting data
transmitted between clients and servers.
Real-world Examples
Real-world examples include the encryption of files on
03 hard drives, securing Wi-Fi networks with WEP or WPA,
and safeguarding database contents from
unauthorized access.
05 Asymmetric Cryptography
Introduction to Asymmetric Methods
SSL/TLS Protocols
SSL/TLS protocols use asymmetric
2312
Digital Signatures Key Exchange
cryptography to encrypt data during Mechanisms
Digital signatures are created using
transmission between web browsers Asymmetric cryptography enables
asymmetric algorithms to verify the
and servers. This ensures secure secure key exchange protocols,
authenticity of electronic messages
connections for online transactions and such as Diffie-Hellman, allowing
or documents. They ensure that the
communications. two parties to collaboratively
sender’s identity is verified and that
generate a shared secret key over
the message has not been altered.
an unsecured channel.
17
06 Future Trends in Cryptography
Emerging Technologies
Quantum Cryptography