際際滷

際際滷Share a Scribd company logo
C r y p t o g r a p h y
Presented by Saumil Patel
Divyarajsinh Vaghela
Richa Raval
Milan Patel
History and
Introduction of
Cryptography
-Richa Raval
C R Y P T O G R A P H Y
An art of making and solving codes
What is Cryptography?
C R Y P T O G R A P H Y
What was the need to invent Cryptography?
For Secure Communication
C R Y P T O G R A P H Y
Hacker
C R Y P T O G R A P H Y
Key Words
 Plain Text :- It is the simple text.
 Cipher Text :- It is the coded text.
 Encryption :- Converting plain text into
Cipher text.
 Decryption :- Converting back from Cipher
text into Plain text.
(Ex. Hello)
(Ex. lkjne)
C R Y P T O G R A P H Y
Defination
It is the practice and study of
techniques for secure
communication of data.
This system is called Cryptosystem.
of
Ancient History
Pioneer of Cryptography :- Julius Caesar
Birth :- 100 BC
Country :- Rome
Invention :- Shift Cipher method
Ancient History
 Started in Egypt in 3000 B.C.
 They found it very complicate due to
insufficient knowledge of Mathematics
& Cryptography.
 Finally they had to stop it
Ancient History
 Weakness of Shift Cipher :- Any one can decrypt it easily
 Well known example of
Mary Queen of Scot
Queen Elizabeth I
c
c
Modern History
(Zimmermanns Telegram)
Sent by Arthur Zimmermann, the
foreign secretary of Germany on
11/01/1917.
United States entered into
World War - I
It was intercepted and decoded
by British Intelligence.
In 20th Century
Invented by Arthur Scherbius at
the end of World War I.
Intention:- To Encode and decode
of Ciphers.
 Adopted by Military and Govt.
First broken by Polish Cipher
Bureau in Dec.1932 by using
Theoretical Mathematics and
Reverse Engineering.
Enigma Machine
In 21th Century
After the end of World War II, the Encryption
and Decryption has shifted from .
In 21th Century
Parallel to the development of
advance methods in Cryptography were developed.
Shift Cipher
DES Cipher RSA Cipher
Permutation Cipher
DH Secret key exchange method
Ceasar Cipher/
Shift Cipher Method
-Saumil Patel
Indian Army
Pakistan Army
ATTACK AT
5 P.M.
DWWDFND
WILYHSP
DWWDFND
WILYHSP
ATTACK AT
5 P.M.
?
How did they do it???
They use a method called
CEASAR CIPHER
CEASAR CIPHER
 One of the simplest and widely known
encryption technique.
 Named after Julius Caesar.
 He used it in his private
communication.
 This method is also known as
Shift Cipher or Ceasers Code.
CEASAR CIPHER
CEASAR CIPHER
How to convert a text into Cipher Code?
Step -1 :- Remove space, comma(,) , dot(.),  ,
etc.
and write a simple sentence.
Step -2 :- Replace numbers by alphabets.
ex. 5  FIVE
Step -3 :-Replace each alphabet by a definite shift.
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -1 :- Remove space, comma(,) , dot(.),  ,
etc.
and write a simple sentence.
 ATTACKAT5PM
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
 ATTACKAT5PM
Step -2 :- Replace numbers by alphabets.
 ATTACKATFIVEPM
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Step -3 :-Replace each alphabet by a definite shift.
Plain Text :A T T A C K A T F I V E P M
Cipher Text :D W W D F N D W I L Y H S P
CEASAR CIPHER
Ex. ATTACK AT 5 P.M.
Cipher Text: DWWDFNDWILYHSP
Cipher Disk &
Permutation Method
-Divyarajsinh Vaghela
Cipher Disk
 Enciphering & Deciphering tool.
 Developed by Italian Architect
Leon Battista Alberti in 1470.
 It Consist of two concentric disk.
1) Large :- Stationary
2) Small :- Movable
Cipher Disk
Plain TextCipher
Text
Cipher Disk
 How Cipher Disk is Useful ?
Disadvantage of Shift Cipher method is that
there are only 25 different possibilities for
each alphabet.
Cipher Disk is useful to decrypt the Cipher
code very quickly.
Permutation Cipher
 It is one of the most advance methods used
now a days.
What is the advantage to use Permutation Cipher?
 It is next to impossible to decrypt the code
encrypted by Permutation Cipher.
Permutation Cipher
* Method to create Permutation Cipher Code:-
Step-1 :- Write all the alphabets in a row for the
plain text.
Step-2 :- Randomly choose any of the 26 alphabets
for each alphabet of the plain text.
Ex. For A choose N, For B choose W, etc
Permutation Cipher
P E Z R N H I M A W F O B G V Y L D K C J Q S U T X
Permuted Alphabet
Permutation Cipher
Ex. ATTACK AT 5 P.M.
 A T T A C K A T F I V E P M
P PCC Z F P CHAQ N Y B
Permutation Cipher
ATTACK AT 5 P.M. PCCPZFPCHAQNYB
PCCPZFPCHAQNYB
Applications &
Importance of
Cryptography
- Milan Patel
 Cryptography plays an important role in
many IT applications !
HOW..???
Lets see an overview
Strong Authentication
 Cryptography plays an important role in
Identity Management.
There are many methods from
to
Strong Authentication
OTP tokens
( One Time Password Generating tokens)
- Popular solution for securing
authentication.
- Widely used in Banks.
- Manufactured by RSA,
VASCO, Codes, etc.
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
HTTPS
Strong Authentication
Secure version of HTTP
 To access e-banking site.
 To secure online credit card transaction.
 For secure email messaging.
 File sharing.
TLS protocol
Strong Authentication
(Transport Layer Security)
- Most widely used protocol.
- Ex. Certificate for server authentication.
Wireless Communication
Why use Cryptography for Wireless Communication ?
Because
-It is very easy for any one to hack any wireless
communication than an wired communication.
-All that required are only laptop and an antenna..!
Wireless Communication
 It is the most widely used standard for wireless
networking today.
 Cryptography plays an important role in Wi-fi in two
ways
1) Securing data transmission
2) End point authentication
Wireless Communication
 It is designed to enable wireless data exchange over
short distance.
 Cryptography plays an important role in Bluetooth in
two aspect :-
1) Confidentially
2) Authentication (called pairing)
Every person in this world is related to
CRYPTOGRAPHY!
Communication Technology
Cyber Security
CRYPTOGRAPHY
Cryptography
Ad

Recommended

永姻艶壊艶稼岳温界庄坦稼1
永姻艶壊艶稼岳温界庄坦稼1
alvarooo10
A TLS Story
A TLS Story
ereddick
History of cryptography
History of cryptography
Farah Shaikh
The Engima Cipher
The Engima Cipher
guestfaf89d
Security Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
Bernhard Hofer
Security Systems for Digital Data
Security Systems for Digital Data
Bernhard Hofer
Fundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
enigma cipher machine
enigma cipher machine
Aryan Raj
Cryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and types
sowaibakhan3
Computer systems security 7-cryptography.ppt
Computer systems security 7-cryptography.ppt
stephen972973
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...
researchcollabarator
Introduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Computer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Information system security Unit 2.pptx
Information system security Unit 2.pptx
Dr. Pallawi Bulakh
Computer security communication networking cryptography .ppt
Computer security communication networking cryptography .ppt
tipurple7989
introduction to cryptography and its basic techniques
introduction to cryptography and its basic techniques
AneelSoomro1
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
vikashbharati917
computer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.ppt
dumaguitlouie4
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
ssuserc7a853
Chaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash function
ssuser478d0e
Symmetric Encryption Techniques
Symmetric Encryption Techniques
Dr. Kapil Gupta
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
jamkhan10
7-cryptography.ppt
7-cryptography.ppt
akamkhalidmohammed
Introduction to Cryptography and its Basic Fundamentals
Introduction to Cryptography and its Basic Fundamentals
Chinfeliprada1
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
vimalguptaofficial
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
MuhammadShajid1
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2

More Related Content

Similar to Cryptography (20)

Cryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and types
sowaibakhan3
Computer systems security 7-cryptography.ppt
Computer systems security 7-cryptography.ppt
stephen972973
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...
researchcollabarator
Introduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Computer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Information system security Unit 2.pptx
Information system security Unit 2.pptx
Dr. Pallawi Bulakh
Computer security communication networking cryptography .ppt
Computer security communication networking cryptography .ppt
tipurple7989
introduction to cryptography and its basic techniques
introduction to cryptography and its basic techniques
AneelSoomro1
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
vikashbharati917
computer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.ppt
dumaguitlouie4
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
ssuserc7a853
Chaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash function
ssuser478d0e
Symmetric Encryption Techniques
Symmetric Encryption Techniques
Dr. Kapil Gupta
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
jamkhan10
7-cryptography.ppt
7-cryptography.ppt
akamkhalidmohammed
Introduction to Cryptography and its Basic Fundamentals
Introduction to Cryptography and its Basic Fundamentals
Chinfeliprada1
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
vimalguptaofficial
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
MuhammadShajid1
Cryptography, Cryptology, Encryption and types
Cryptography, Cryptology, Encryption and types
sowaibakhan3
Computer systems security 7-cryptography.ppt
Computer systems security 7-cryptography.ppt
stephen972973
Cryptography & Steganography
Cryptography & Steganography
Animesh Shaw
Cryptography.pptxhis document provides an overview of cryptography. It define...
Cryptography.pptxhis document provides an overview of cryptography. It define...
researchcollabarator
Introduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
Computer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Information system security Unit 2.pptx
Information system security Unit 2.pptx
Dr. Pallawi Bulakh
Computer security communication networking cryptography .ppt
Computer security communication networking cryptography .ppt
tipurple7989
introduction to cryptography and its basic techniques
introduction to cryptography and its basic techniques
AneelSoomro1
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
9-crypthvvy6u7btyjibuibuibryjijighhnm.ppt
vikashbharati917
computer literacy works papers and pencil ew 9-crypt.ppt
computer literacy works papers and pencil ew 9-crypt.ppt
dumaguitlouie4
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
9-crypt.ppt9-crypt.ppt9-crypt.ppt9-crypt.ppt
ssuserc7a853
Chaos based cryprography - encryption & hash function
Chaos based cryprography - encryption & hash function
ssuser478d0e
Symmetric Encryption Techniques
Symmetric Encryption Techniques
Dr. Kapil Gupta
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
jamkhan10
Introduction to Cryptography and its Basic Fundamentals
Introduction to Cryptography and its Basic Fundamentals
Chinfeliprada1
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
vimalguptaofficial
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
MuhammadShajid1

Recently uploaded (20)

Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
Intellectual Property Right (Jurisprudence).pptx
Intellectual Property Right (Jurisprudence).pptx
Vishal Chanalia
Paper 108 | Thoreaus Influence on Gandhi: The Evolution of Civil Disobedience
Paper 108 | Thoreaus Influence on Gandhi: The Evolution of Civil Disobedience
Rajdeep Bavaliya
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
Chalukyas of Gujrat, Solanki Dynasty NEP.pptx
Chalukyas of Gujrat, Solanki Dynasty NEP.pptx
Dr. Ravi Shankar Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
Sustainable Innovation with Immersive Learning
Sustainable Innovation with Immersive Learning
Leonel Morgado
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
KaryanaTantri21
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
List View Components in Odoo 18 - Odoo 際際滷s
List View Components in Odoo 18 - Odoo 際際滷s
Celine George
Vitamin and Nutritional Deficiencies.pptx
Vitamin and Nutritional Deficiencies.pptx
Vishal Chanalia
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
Values Education 10 Quarter 1 Module .pptx
Values Education 10 Quarter 1 Module .pptx
JBPafin
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
LDMMIA Shop & Student News Summer Solstice 25
LDMMIA Shop & Student News Summer Solstice 25
LDM & Mia eStudios
Intellectual Property Right (Jurisprudence).pptx
Intellectual Property Right (Jurisprudence).pptx
Vishal Chanalia
Paper 108 | Thoreaus Influence on Gandhi: The Evolution of Civil Disobedience
Paper 108 | Thoreaus Influence on Gandhi: The Evolution of Civil Disobedience
Rajdeep Bavaliya
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
Sustainable Innovation with Immersive Learning
Sustainable Innovation with Immersive Learning
Leonel Morgado
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
KaryanaTantri21
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
Great Governors' Send-Off Quiz 2025 Prelims IIT KGP
IIT Kharagpur Quiz Club
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
List View Components in Odoo 18 - Odoo 際際滷s
List View Components in Odoo 18 - Odoo 際際滷s
Celine George
Vitamin and Nutritional Deficiencies.pptx
Vitamin and Nutritional Deficiencies.pptx
Vishal Chanalia
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
Ad

Cryptography

Editor's Notes

  • #2: <number>
  • #43: <number>