Professional Documents
Culture Documents
Adem Seminar PPT Final Reportsss
Adem Seminar PPT Final Reportsss
Introduction
Purpose of Cryptography
Types of Cryptography
Challenge of Cryptography
Types of Cryptographic Algorithms
Cryptography Tools
Cryptography in Everyday Life
Conclusion
Introduction
Sign Tool.exes
This is the popular tool mostly used by Microsoft to sign
the files. Adding a signature and time stamp to any kind
of file is the prominent feature supported by this tool.
With the timestamp in the file, it holds the ability to
authenticate the file.
Docker
Using docker one can build huge applications. The
information maintained in the docker is completely in an
encrypted format. In this, cryptography has to be strictly
followed to move with encryption of data.
Cryptography in Everyday Life
Authentication/Digital Signatures
Authentication and digital signatures are a very important application of
public-key cryptography. Pretty Good Privacy (PGP) is a software package
originally developed by Phil Zimmerman that provides encryption and
authentication for e-mail and file storage applications..
Time Stamping
Time stamping is a technique that can certify that a certain electronic
document or communication existed or was delivered at a certain time. Time
stamping uses an encryption model called a blind signature scheme.
Electronic Money
Encryption is used in electronic money schemes to protect conventional
transaction data like account numbers and transaction amounts, digital
signatures can replace handwritten signatures or a credit-card authorizations,
and public-key encryption can provide confidentiality.
CONCLUSION