Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
V. Praneeth
Kumar
CONTENTS
SECURITY
SECURITY THREATS
SECURITY GOALS
WHAT IS CRYPTOGRAPHY
BASIC TERMS
ENCRYPTION & DECRYPTION
CATEGORIES OF CYRPTOGRAPHY
COMPARISON
CONCLUSION
SECURITY???
THREATS
SECURITY GOALS
CONFIDENTIALITY
INTEGRITY
SECURE
NON-REPUDIATION
CRYPTOGRAPHY
Cryptography is the
BASIC TERMS
PLAIN TEXT
CIPHER TEXT
CIPHER
ENCRYPTION & DECRYPTION
KEYS
CATEGORIES OF CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAP
HY
ASYMMETRIC
KEY
CRYPTOGRAPH
Y
SYMMETRIC KEY
CRYPTOGRAPHY
Also known as secret key. Sender &
RECEIV
ER
SECRET
KEY
ENCRYPTIO
N
CIPHERTE
XT
DECRYPTIO
N
TRADITIONAL
CIPHERS
SUBSTITUTIO
N CIPHER
TRANSPOSITI
ON CIPHER
SUBSTITUTION CIPHERS
A substitution technique is one in
TRANSPOSITION CIPHER
In the transposition technique the positions of
ASYMMETRIC KEY
CRYPTOGRAPHY
Also known as public key
RECEIV
ER
PUBLIC
KEY
ENCRYPTIO
N
PRIVATE
KEY
CIPHERTE
XT
DECRYPTIO
N
KEYS USED IN
CRYPTOGRAPHY
SYMMETRIC
KEY
CRYPTOGRAP
HY
ASYMMETRIC
KEY
CRYPTOGRAPHY
COMPARISON
SYMMETRIC
CRYPTOGRAPHY
KEY ASYMMETRIC
CRYPTOGRAPHY
KEY
kept secret.
MODERN PRACTICES
QR codes
Steganography
Firewalls
APPLICATIONS
Defense services
Secure data manipulation
E commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security
CONCLUSION
By using of encryption techniques a fair unit
S
K
N
A
TH