0% found this document useful (0 votes)
8 views

UNIT 3-Cryptography

Uploaded by

sanjaygarud1966
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

UNIT 3-Cryptography

Uploaded by

sanjaygarud1966
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Cryptography

•Reporter
01 Introduction to Cryptography

02 Substitution Techniques

03 Steganography

CONTENTS
04 Symmetric Cryptography

05 Asymmetric Cryptography

06 Future Trends in Cryptography


01 Introduction to Cryptography
Definition and Importance

What is Cryptography?
Cryptography is the practice and study of techniques
for securing communication and information from
adversaries. It involves creating codes and systems
that protect data, ensuring that only authorized
users can access or manipulate it.
Historical Context
The history of cryptography dates back to ancient
civilizations, where simple ciphers were used to
secure military communications. Over time, it
evolved to include complex mathematical
algorithms, playing a crucial role in World Wars and
Modern Applications
beyond.
Today, cryptography underpins security in digital
communications, e-commerce, and data protection.
It is essential for online banking, email security, and
privacy in applications like messaging services and
social networks.
Key Concepts

Authentication
Authentication verifies the identity of a user or
system. It can be achieved through various
methods, such as passwords, biometric data, or
digital certificates, ensuring that only legitimate
users can access resources.
Integrity
Integrity involves ensuring that data is accurate
and unaltered during transmission or storage.
Hash functions and checksums are commonly
used to detect any modifications or corruption in
the data.
Confidentiality
Confidentiality ensures that information is only
accessible to those who have the right to see it.
Techniques such as encryption help maintain
this aspect, protecting sensitive data from
unauthorized access.
02 Substitution Techniques
Overview of Substitution
What are Substitution Techniques?

Substitution techniques involve replacing elements of


plaintext with other elements to create ciphertext. They
are fundamental in cryptography for obscuring
messages, making them unreadable to unintended
recipients.
Types of Substitution Ciphers

Common types of substitution ciphers include


monoalphabetic ciphers, where each letter is replaced
with another letter, and polyalphabetic ciphers, which
use multiple cipher alphabets to enhance security.

Use Cases in History

Throughout history, substitution ciphers were


employed in military and diplomatic communications,
providing a layer of security that was crucial during
conflicts, such as the American Revolution and World
Examples of Substitution Techniques
Caesar Cipher Atbash Cipher

The Caesar cipher, named after The Atbash cipher is a


Julius Caesar, involves shifting the monoalphabetic substitution cipher
alphabet by a fixed number of where each letter is replaced with
places. Though simple, it is among its reverse in the alphabet. For
the earliest known encryption example, 'A' becomes 'Z', making it
techniques, highlighting the a straightforward yet effective
concept of substitution. method for obscuring text.

Vigenère Cipher
The Vigenère cipher uses a keyword to shift
letters in a way that creates a polyalphabetic
substitution. It improves security over simple
substitution by combining multiple Caesar
ciphers, making it harder to break.
03 Steganography
Understanding Steganography

Differences from Cryptography


While cryptography transforms data to secure it, steganography
hides data in plain sight. The goal of steganography is to prevent
suspicion, whereas cryptography protects the content from being
understood even if detected.
Historical Examples
Historical examples of steganography include using invisible ink
during wartime or embedding messages in artwork. These
methods demonstrated the effectiveness of hiding information
without revealing its presence.
Definition and Purpose
Steganography is the art of hiding messages within another
medium, such as images, audio, or text, to avoid detection.
Unlike cryptography, which obscures the content,
steganography conceals the very existence of the message.
Techniques in Steganography

Image Steganography Audio Steganography Text Steganography

Text steganography involves hiding


Image steganography involves Audio steganography encodes
messages within text documents
hiding data within the pixels of an information within audio files by
using methods like changing the
image. Techniques often modifying certain frequencies that
formatting or inserting extra
manipulate the least significant are less perceptible to human
characters. This subtle alteration
bits, allowing secret information to ears. This technique is useful for
conceals the message while
blend seamlessly with the visual embedding messages in music or
maintaining the overall appearance of
data of the image. voice recordings.
04 Symmetric Cryptography
Definition and Mechanism

01 02 03
What is Symmetric Key Distribution Common Symmetric
Cryptography? Challenges Algorithms

Symmetric cryptography The major challenge with Common symmetric


uses the same key for both symmetric cryptography lies algorithms include AES
encryption and decryption. in securely distributing the (Advanced Encryption
This means that both the key. If the key is intercepted Standard), DES (Data
sender and receiver must during sharing, it can Encryption Standard), and
have access to the shared compromise the security of Blowfish. These algorithms
key, making key the encrypted messages. are designed to encrypt data
management critical for quickly while providing
security. robust security.
Applications and Use Cases

Data Encryption
Symmetric cryptography is widely used for encrypting
01 sensitive data, such as personal information and
financial transactions, ensuring that unauthorized
parties cannot access or read the information.
Network Security
In network security, protocols like IPsec and SSL/TLS
02 utilize symmetric encryption to secure
communications over the internet, protecting data
transmitted between clients and servers.
Real-world Examples
Real-world examples include the encryption of files on
03 hard drives, securing Wi-Fi networks with WEP or WPA,
and safeguarding database contents from
unauthorized access.
05 Asymmetric Cryptography
Introduction to Asymmetric Methods

Public and Private Keys

The public key can be shared openly,


allowing anyone to encrypt messages,
while the private key remains
What is Asymmetric confidential to the owner. This
Cryptography?
separation facilitates safer
Asymmetric cryptography, also communication without the need for
known as public key cryptography,
Benefits over Symmetric
prior key exchanges.
Cryptography
utilizes a pair of keys: a public key
The primary benefits of asymmetric
for encryption and a private key for
cryptography include improved key
decryption. This two-key system
distribution and the ability to
enhances security and simplifies
provide digital signatures, offering
key management.
an additional layer of security
through verifiable authenticity.
Applications of Asymmetric Techniques

SSL/TLS Protocols
SSL/TLS protocols use asymmetric
2312
Digital Signatures Key Exchange
cryptography to encrypt data during Mechanisms
Digital signatures are created using
transmission between web browsers Asymmetric cryptography enables
asymmetric algorithms to verify the
and servers. This ensures secure secure key exchange protocols,
authenticity of electronic messages
connections for online transactions and such as Diffie-Hellman, allowing
or documents. They ensure that the
communications. two parties to collaboratively
sender’s identity is verified and that
generate a shared secret key over
the message has not been altered.
an unsecured channel.

17
06 Future Trends in Cryptography
Emerging Technologies

Quantum Cryptography

Quantum cryptography leverages


principles of quantum mechanics to
create secure communication channels. Blockchain and Cryptography
It promises unbreakable encryption due
to the nature of quantum states, Blockchain technology heavily relies on
revolutionizing data security in the future. cryptographic principles to secure
transactions and verify user identities. Its
decentralized nature enhances security
by preventing unauthorized access and
manipulation of data.
Challenges Ahead
Regulatory and
Compliance Issues
The growing importance of data
privacy regulations, such as
Adapting to New
Threats GDPR, presents challenges for

As technology evolves, cyber cryptography. Organizations must

threats become more ensure that their cryptographic

sophisticated. Cryptography practices comply with legal


Maintaining Data
standards while maintaining
must continuously adapt to
Privacy
these challenges, developing security.
Ensuring data privacy while
stronger encryption methods to
implementing cryptographic measures is
protect against emerging
crucial. Balancing accessibility for
vulnerabilities.
legitimate users and protecting against
unauthorized access remains a key
concern for future cryptographic
developments.
Thank you for listening.
•Reporter

You might also like