You are on page 1of 8

CONTENTS

1. Introduction
2. Overview of Cryptography & its Application
3. Terminology
4. Cryptography Components
5. Symmetric key Cryptography
6. History of Public key Cryptosystem
7. Asymmetric key Cryptography
8. Asymmetric Algorithms
9. Working
10. Conclusion
11. Bibliography








INTRODUCTION

Cryptography is the science of information security. The word is derived from the
Greek kryptos, meaning hidden. Cryptography includes techniques such as microdots,
merging words with images, and other ways to hide information in storage or transit. Modern
cryptography intersects the disciplines of mathematics, computer science, and electrical
engineering. Applications of cryptography include ATM cards, computer passwords,
and electronic commerce.
Cryptology prior to the modern age was almost synonymous with encryption, the conversion
of information from a readable state to apparent nonsense. The sender retained the ability to
decrypt the information and therefore avoid unwanted persons being able to read it.
Since WWI and the advent of the computer, the methods used to carry out cryptology have
become increasingly complex and its application more widespread.
Modern cryptography follows a strongly scientific approach, and designs cryptographic
algorithms around computational hardness assumptions, making such algorithms hard to
break by an adversary. Such systems are not unbreakable in theory but it is infeasible to do
so by any practical means. These schemes are therefore computationally secure. There
exist secure schemes that provably cannot be broken--an example is the one-time pad--but
these schemes are more difficult to implement than the theoretically breakable but
computationally secure mechanisms.



Overview of Cryptography & Its Applications
People want and need privacy and security while
communicating. In the past, cryptography was heavily used for military
applications to keep sensitive information secret from
enemies (adversaries). Nowadays, with the technologic progress as our
dependency on electronic systems has increased we need
more sophisticated techniques. Cryptography provides most of the methods and techniques for
a secure communication

Confidentiality:- the information cannot be understood by anyone for whom it was unintended.
Integrity :-the information cannot be altered in storage or transit between sender and intended
receiver without the alteration being detected.
Authentication :-the sender and receiver can confirm each others identity and the
origin/destination of the information.









Terminology

Cryptology: All-inclusive term used for the study of secure
communication over non-secure channels.

Cryptography: The process of designing systems to realize
secure communications over non-secure channels.
Cryptoanalysis: The discipline of breaking the cryptographic
systems.

Coding Theory: Deals with representing the information using codes. It covers compression,
secrecy, and error correction.



Cryptography components

Encryption It is a process of changing or converting normal text or data
information into gibberish text.
Decryption It is a process of changing or converting gibberish text back to correct
message or data by using encryption method.









SYMMETRIC- KEY CRYPTOGRAPHY
A single common encryption key is used to encode and decode messages.
Both sender and receiver must know the common key.
The common key need to be exchanged before hand by some other secure method.
Symmetric encryption is simple and fast.
But - key management is impractical with large number of senders and receivers.








Asymmetric-key cryptography
Asymmetric system under, which two different keys are used to encrypt and
decrypt the message or received data packet.
On public key is used to encrypt the data or message and the private key on
receiving end is used to decrypt the message or data packet.
Each user has a Public key and a corresponding Private(secret) key









WORKING

Everybody selects its own public key P and private key S, and publicizes P
Therefore Alice has (P
a
, S
a
), and Bob has (P
b
, S
b
)
Everybody knows P
a
, P
b
,


Suppose Alice wants to send a message to Bob.
Alice encrypts the message with Bobs public key P
b
and sends out.
(only) Bob can decrypt the message using his private key S
b
. Nobody else can.










Asymmetric Algorithms









History of Public-Key
Cryptosystem




1970 The public-key cryptography was proposed by James Ellis, The possibility of non-
secret encryption. This paper was not published
1973 Clifford Cocks paper a note on non-secret encryption, same as RSA
1976 The idea of Public Key Cryptography was put by Diffie and Hellman
1977 Rivest, Shamir and Adleman invented RSA Cryptosystem.



CONCLUSION
Public-key cryptography Increased security and convenience.
Public-key cryptography is best suited for an open multi-user environment.
Symmetric encryption is simple and fast.
Unsymmetrical encryption is the safest.



BIBLIOGRAPHY
1) www.wikipedia.com

You might also like