Cryptography Introduction. Definition Origin Objectives Terminologies References Agenda.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
Cryptography The science of writing in secret code.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Network Security – Part 1 Spring 2005 V.T. Raja, Ph.D., Oregon State University.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography, Authentication and Digital Signatures
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Encryption.
Cryptography Lynn Ackler Southern Oregon University.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Encryption CS110: Computer Science and the Internet.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Network Security Celia Li Computer Science and Engineering York University.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography – Test Review
Basics of Cryptography
CIT 380: Securing Computer Systems
Cracking Encrypted Systems
CSc 8320 Advanced Operating Systems Barnali Chakrabarty
Cryptography Dr. X.
Encryption
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
CSCI-235 Micro-Computer Applications
Chapter 3:Cryptography (16M)
Security through Encryption
Cryptography “The Secret Code Language”
Cryptology/Cryptography
Simple Encryption- Lesson 5
Network Security Security Techniques: Encryption & decryption :
Cryptography Cryptography is derived from the Green word ‘kryptos’
Cryptography a Presentation Prepared by Vytautas Kondratas.
Digital Communications
Basic of Modern Cryptography
Computer Security Chapter Two
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
Introduction to Encryption Technology
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Cryptography Introduction

Definition Origin Objectives Terminologies References Agenda

The word is derived from the Greek word kryptos, meaning hidden or secret. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries. Definition

The origin of cryptography is usually dated from about 2000 BC, with the Egyptian practice of hieroglyphics (complex pictograms) The first known use of a modern cipher was by Julius Caesar, who did not trust his messengers when communicating with his governors and officers. For this reason, he created a system in which each character in his messages was replaced by a character three positions ahead of it in the Roman alphabet. Origin

1.Confidentiality (the information cannot be understood by anyone for whom it was unintended) 2.Integrity (the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected) 3.Non-repudiation (the creator/sender of the information cannot deny at a later stage his or her intentions in the creation or transmission of the information) 4.Authentication (the sender and receiver can confirm each others identity and the origin/destination of the information) Objectives

1.Plaintext - information a sender wishes to transmit to a receiver 2.Ciphertext - result of encryption performed on plaintext using an algorithm 3.Encryption - process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext) 4.Decryption - process of converting ciphertext back to plaintext 5.Cryptanalysis - how to crack encryption algorithms or their implementations 6.Cryptology - the Math Behind Hiding and Breaking Messages Terminologies

References:

TFF ZPV UPNPSSPX UIBOL ZPV SEE YOU TOMORROW THANK YOU