Submitted By:-Shubham Oberoi Submitted TO: - M/s Kajal Sharma

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Submitted TO:- Submitted by:-

M/s Kajal sharma Shubham oberoi


SECURITY
SECURITYTHREATS
SECURITYGOALS
WHAT ISCRYPTOGRAPHY
BASICTERMS
ENCRYPTION& DECRYPTION
CATEGORIESOFCYRPTOGRAPHY
COMPARISON
CONCLUSION
SECURITY???
CONFIDENTIALITY INTEGRITY

SECURE

NON-REPUDIATION
• Cryptography is the
science and art of
transforming messages
to make them secure
and immune to attack.
PLAIN TEXT
CIPHERTEXT
CIPHER
ENCRYPTION& DECRYPTION
KEYS
SYMMETRIC KEY ASYMMETRIC KEY
CRYPTOGRAPHY CRYPTOGRAPHY
• Also known as secret key. Sender & receiver
uses same key & an encryption/decryption
algorithm to encrypt/decrypt data. i.e. thekey
is shared.
Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC&
PRIVATErespectively.
SENDER RECEIVER

PUBLIC KEY PRIVATE KEY

ENCRYPTION DECRYPTION
CIPHERTEXT
SYMMETRIC KEY ASYMMETRIC KEY
CRYPTOGRAPHY CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY ASYMMETRIC KEY CRYPTOGRAPHY
1) The same algorithm with the same 1)One algorithm is used for encryption
key is used for encryption and and decryption with a pair of keys, one
decryption. for encryption and one for decryption.

2) The key must be kept secret. 2)One of the two keys must be kept
secret.

3)It may be impossible or at least 3)It may be impossible or at least


impractical to decipher a message if no impractical to decipher a message if no
other information is available. other information is available.
Defense services
Secure data manipulation
E–commerce
Business transactions
Internet payment systems
User identification systems
Access control
Data security
By using of encryption techniques a fair unit of
confidentiality, authentication, integrity, accesscontrol
and availability of data ismaintained.

You might also like