Introduction To Cryptography

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

Introduction to

Cryptography
Cryptography is the practice of securing information through the use of codes,
ciphers, and mathematical algorithms. It is a fundamental tool for protecting
sensitive data and enabling secure communication in the digital age.
History of Cryptography
Ancient Techniques Continuing Evolution
Cryptography has its roots in ancient Cryptography continues to evolve to meet the
civilizations, where simple substitution ciphers growing challenges of data security in the
were used to conceal messages. digital landscape.

1 2 3

Modern Cryptography
The development of computers and the digital
age has led to the creation of sophisticated
cryptographic algorithms and protocols.
Symmetric Key Cryptography
Shared Secret Key Exchange Algorithms

Symmetric key cryptography The challenge in symmetric Common symmetric key


relies on a shared secret key key cryptography is securely algorithms include AES, DES,
between the sender and exchanging the shared key and Blowfish, which are
receiver to encrypt and between the communicating widely used for data
decrypt messages. parties. encryption.
Asymmetric Key Cryptography

1 Public-Private Keys
Asymmetric key cryptography uses a pair of mathematically related keys: a public
key and a private key.

2 Encryption and Decryption


Data encrypted with the public key can only be decrypted with the corresponding
private key, and vice versa.

3 Key Establishment
Asymmetric key cryptography enables secure key establishment between parties
without the need for a shared secret.
Cryptographic Hash Functions

1 One-Way 2 Collision 3 Applications


Transformation Resistance
Hash functions are used
It is computationally in digital signatures,
Hash functions take an infeasible to find two message authentication,
input message and different messages that and password storage.
produce a fixed-length produce the same hash
output, called a hash value.
value or digest.
Key Management
Key Generation Key Storage
Secure generation and distribution of Proper storage and protection of keys,
cryptographic keys is crucial for the overall including the use of hardware security
security of a system. modules, is essential.

Key Revocation Key Lifecycle


Mechanisms for revoking and replacing Effective key management policies govern the
compromised keys are necessary to maintain entire lifecycle of cryptographic keys.
system security.
Cryptographic Algorithms

Encryption Hashing Digital Signatures Key Exchange


Algorithms like AES, Algorithms like SHA-
DES, and RSA are 256 and MD5 are used Algorithms like Algorithms like
used to encrypt and to generate ECDSA and RSA are Diffie-Hellman and
decrypt data. cryptographic hash used to create digital ECDH are used to
values. signatures. establish shared secret
keys.
Applications of Cryptography

Data Protection Identity Network Blockchain


Management Security
Cryptography
Cryptography Cryptography is underpins the
secures sensitive Cryptographic essential for security and
information like techniques are used protecting data in integrity of
financial data, for secure transit over blockchain-based
personal records, authentication and computer networks. systems and
and authorization cryptocurrencies.
communications. processes.

You might also like