Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Copy of Cryptography

No description
by

on 11 January 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Copy of Cryptography

What is Cryptography?
Cryptography
Eg: RSA
AES
Modern-day standard symmetric-key encryption
Developed by Belgian cryptographers Joan Daemen and Vincent Rijmen
Used by NSA for SECRET and TOP SECRET information
Literature Survey
PAST
Scytales
Enigma
TODAY
RSA
PGP
DES
FUTURE
QUATUM CRYPTOGRAPHY
Encryption
WPA
WPA-2
CRYPTOGRAPHY
• Advantages
• Disadvantages
Hidden writing.
Increasingly used to protect information.
Can ensure Confidentiality,
Integrity and Authenticity too.
History
Early cryptography was solely concerned with converting messages into unreadable groups of figures to protect the message’s content during the time the message was being carried from one place to another.


In the modern era, cryptography has grown from basic message confidentiality to include some phases of message integrity checking, sender/receiver identity authentication, and digital signatures, among other things
What is CRYPTOGRAPHY?
Literature Survey on Cryptography
Substitution cipher:
Eg:CEASER CIPHER (Julius Ceaser): Around 50 B.C
Transposition cipher:
Eg:SCYTALE (Greeks and Spartans): 500 B.C
Keyword:CAT
Message:SKY IS BLUE
Encrypted message:HKSUTSILEYBE
C A T
3 1 20
T H E
S K Y
I S B
L U E
Rotor machine:
Eg:ENIGMA MACHINE (GERMANS): During World War 2
Eg 2:ADVANCED ENCRYPTION STANDARD (AES): Joan Daemen, Vincent Rijmen 1998
b.Symmetric key stream ciphers:

Eg: RC4 Ron Rivest 1987
Public key/Assymetric cipher:
RSA = Rivest-Shamir-Adelman 1978
Clifford Cocks
Uses a one-way function (multiplying/factoring large primes)
Example of public-key encryption
Quantum cryptography
the final battle ???
Abdul Haseeb
Usman javed
Osama Maqbool
• WiFi Protected Access was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard.
• It was formally adopted in 2003, a year before WEP was officially retired.
• The most common WPA configuration is WPA-PSK (Pre-Shared Key).
• The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system.

WPA
• WPA has, as of 2006, been officially superseded by WPA2.
• One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).

WPA-2
Advantages
and
Disadvantages
• The advantage of an encryption is to help keep personal information private.
• It hides the message and keep your data safe.
• No one would be able to know what it says

• Disadvantage of an
encryption can be when the
password is forgotten
information can't be accessed.
Advantages
Disadvantages
Encryption
In cryptography, encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can.
Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted.
Examples
Plain text=Abdul Haseeb
Encryption
Abdul Haseeb
+2
Cefwn"Jcugge
Key=2
Encrypted text=Cefwn"Jcugge
Decryption
Key=2
Cefwn"Jcugge
-2
Abdul Haseeb
Plain text=Abdul Haseeb
------------------------------------------------------------------------------------------------------
SENDER
RECEIVER
Group Members
Cryptography
Nowadays
Where
How
Why
Conclusion
Questions
Full transcript