Professional Documents
Culture Documents
ON Cryptography: BY: Deepak Krishna 08/ ME/08 Mechanical Fiem, Kolkata
ON Cryptography: BY: Deepak Krishna 08/ ME/08 Mechanical Fiem, Kolkata
ON
CRYPTOGRAPHY
BY:
DEEPAK KRISHNA
08/ ME/08
MECHANICAL
FIEM, KOLKATA
CONTENTS
1. Introduction
2. Overview of Cryptography & its Application
3. Terminology
4. Cryptography Components
5. Symmetric key Cryptography
6. History of Public key Cryptosystem
7. Asymmetric key Cryptography
8. Asymmetric Algorithms
9. Working
10. Conclusion
11. Bibliography
INTRODUCTION
Everybody selects its own public key P and private key S, and
publicizes P
Therefore Alice has (Pa , Sa), and Bob has (Pb , Sb)
Alice encrypts the message with Bob’s public key Pb and sends
out.
(only) Bob can decrypt the message using his private key Sb.
Nobody else can.
Asymmetric Algorithms
History of Public-Key
Cryptosystem