Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

CRYPTOGRAPHY AND TEXT ENCRYPTION

LAB 3
CRYPTOGRAPHY

 The most common method for securing data transmissions in web


applications or computer science projects is modern Cryptography. It is
like a secret code language that helps to keep information safe.
WHY TO LEARN CRYPTOGRAPHY?

 Imagine that you have got a secret message, and you only want certain
people to crack the code. Cryptography comes to the rescue in the digital
realm. It is like keeping your message into an unseen envelope that only
the designated receiver can open.
 Learning cryptography makes it fun and hands-on. You can create your
own secret codes and understand how to decode others. And, it is a cool
skill to have in today's digital age.
CRYPTOGRAPHY APPLICATIONS
Cryptography has many practical applications which can be a valuable skill :
 We can use cryptography for securing communication by encrypting the messages and emails.
 Secondly we can use it for protecting our data in the applications by securing user data, like passwords
and personal information.
 Also you can secure file storage by securing confidential files and documents.
 Next we can also use cryptography to secure our E-commerce platforms by securing online transactions
and payment information.
 We can also build blockchain technology by ensuring the security and integrity of transactions in
blockchain-based systems.
 Cryptography can also be used for password protection for storing and managing passwords securely.
 And the most important thing is digital signatures for verifying the authenticity of digital messages or
documents.
WHO SHOULD LEARN CRYPTOGRAPHY?

 Learning about cryptography is useful because you can use it in real life
to keep information safe. There are lots of tools and help available for
cryptography. If you learn it, you might find good jobs in cybersecurity
because many companies need people who know how to keep data safe.
WHAT IS CRYPTOGRAPHY?

 Cryptography is the technique of concealing or encoding(changing its original form)


the information in such a way that only the authenticated person can decode(get the
original form) it. This technique of cryptography plays an important role in keeping
our data safe. The data or information can be bank cards, computer passwords or
online transactions and other private data.
 Cryptography is very important in this modern world because it helps to protect your
digital stuff from hackers by turning information into secret language or code.
HOW DOES ASYMMETRIC KEY CRYPTOGRAPHY
WORK?

 Asymmetric-key cryptography is also called Public key cryptography. It is the


cryptographic algorithm which uses pairs or related keys; the keys are known as
public and private keys. Public key is used to encrypt the data and private key is used
to decrypt the data.
 And both the key pairs are generated using cryptographic algorithms. And the security
of public key cryptography depends on keeping the private key secret and the public
key can be shared and distributed publicly.
WHICH ARE THE COMMONLY USED SYMMETRIC KEY
ALGORITHMS?

 Mathematicians and cryptographers create symmetric key encryption methods, like


AES, with the goal that the ciphertext should be impossible to decrypt without the
encryption key. This is true for current secure symmetric encryption algorithms (such
as AES and ChaCha20), but it might not be true for other methods (such as DES and
RC4), which are regarded as insecure symmetric encryption.
 RC5, RC6, Camellia, ARIA, IDEA, Serpent, AES, ChaCha20, CAST, Twofish, and
CAST are a few popular symmetric encryption algorithms. All of these methods are
considered as secure when properly configured and applied.
WHAT ARE THE FOUR PURPOSES OF CRYPTOGRAPHY?

There are four main purpose of cryptography and they are given below :
 Confidentiality
 Integrity
 Authentication
 Non-repudiation
WHAT ARE THE APPLICATIONS OF CRYPTOGRAPHY?

Here are some applications where we can use cryptography :


 Authentication
 Internet of Things
 Card Payments
 PC and different passwords
 Ecommerce Websites
 Digital currency
 Secure file storage
 Digital Signatures
WHICH LANGUAGE IS USED FOR CRYPTOGRAPHY?

The ideal language for cryptography is something you may choose from a wide range of options. See the
languages listed below to get started with the Cryptography :
 Python
 Go
 Ruby
 C++
 C#
 Java
 PHP
WHICH TYPE OF TECHNOLOGY IS USED IN
CRYPTOGRAPHY?

 Cryptography uses many types of technology to keep our data secure. There are some
common technologies used in cryptography like special algorithms (AES or RSA),
computer software created to encrypt and decrypt messages, key management,
cryptographic libraries, public key infrastructure (PKI) and digital signatures.
 Together, these technologies form a secure framework for protecting our sensitive
information across digital networks and communications. This technology plays an
important role in protecting our privacy and ensuring the authenticity and integrity of
data transferred over the Internet. The sensitive data can be our passwords, emails,
and online transactions.
WHY DOES CRYPTOGRAPHY REQUIRE RUST?

 One tool used to protect information through coding is called OpenSSL. It's really
popular as it functions effectively and has numerous expert certifications. It is written
in the computer language C, which presents a concern because it is not always safe
against memory problems.
 We chose to use the different language Rust to rewrite some portions of OpenSSL,
such as its ability to read specific kinds of data, in order to make sure our security
stays at the highest level. Rust helps with maintaining the strength of our security by
being fast and preserving data in memory.
JAVA CODE TO ENCRYPT AND DECRYPT A STRING USING AES
(ADVANCED ENCRYPTION STANDARD)

 Encryption and Decryption in Java using AES

 Explanation
 generateKey: Generates a new AES key of the specified bit length (e.g., 128 bits).
 encrypt: Encrypts the given string using the provided AES key and returns the encrypted string in
Base64 format.
 decrypt: Decrypts the given encrypted string using the provided AES key and returns the original
string.
Thanks

You might also like