際際滷

際際滷Share a Scribd company logo
Topic  E-COMMERCE
Introduction To Basic Encryption
and Decryption
 The term Cryptography means the concept of
encryption and decryption together.
Cryptography is the technique in which the
original plain text message is encrypted i.e.
converted into a coded form called cipher text at
the senders end, which is then transmitted to the
receiver.
 The receiver then decrypts i.e. converts the
cipher text back into the plain text to get the
original message back.
 Cryptography is also called as an art or technique
to achieve the secure communication between the
communicating parties by encoding the messages
between them such that no 3rd party can gain
anything useful out of interception.
 Elliptic curve cryptography (ECC) is an approach
to public-key cryptography based on the algebraic structure
of elliptic curves over finite fields. Elliptic curves are also
used in several integer factorization algorithms that have
applications in cryptography, such as Lenstra elliptic curve
factorization.
 Cryptography is one of the essential technologies used in
building a secure VPN. Different applications of the same
basic algorithms can provide both encryption that keeps
data secret and authentication that ensures the two
security peers in a VPN are who they claim to be. This
chapter introduces some basic concepts in cryptography
and demonstrates how they can be used in practice to
provide data confidentiality. The next chapter continues
this theme with a discussion of mutual authentication
using cryptographic algorithms.
Group 6
 Symmetric-key cryptography is also known as a secret-
key, single key or private key.
 An encryption system in which the sender and receiver
of a message share a single, common key that is used to
encrypt and decrypt the message.
 Symmetric-key systems are simpler and faster, but their
main drawback is that the two parties must somehow
exchange the key in a secure way.
 Public-key encryption avoids this problem because the
public key can be distributed in a non-secure way, and
the private key is never transmitted.
Group 6
Disadvantages of symmetric key:
A symmetric-key algorithm has two major disadvantages.
1) Each pair of users must have a unique symmetric key.
This means that if N people in the world want to use this
method, there needs to be N(N -1)/2 symmetric keys.
For eg:
for 1 thousand people to communicate, 1000* 999 /2
=4,99,500 (4 lakhs 99 thousand and five hundred) symmetric
keys are needed. The distribution of the keys between two parties can
be difficult.
2) The sender needs to exchange the key to the receiver. It may
be hijacked in between.
 Category of Standard: Computer Security.
 Explanation: The Data Encryption Standard
(DES) specifies a FIPS approved cryptographic
algorithm as required by FIPS 140-1.
 Qualifications. The cryptographic algorithm
specified in this standard transforms a 64-bit
binary value into a unique 64-bit binary value
based on a 56-bit variable.
Data Encryption Standard
 The algorithm is designed to encipher and
decipher blocks of data consisting of 64 bits under
control of a 64-bit key
 A block to be enciphered is subjected to an initial
permutation IP and then to a complex key-
dependent computation and finally to a
permutation which is the inverse of the initial
permutation IP-1.
Introduction
 Permutation is an operation performed by a
function, which moves an element at place j to the
place k.
 The key-dependent computation can be simply
defined in terms of a function f, called the cipher
function, and a function KS, called the key
schedule.
 First, a description of the computation.
Group 6
Ad

Recommended

Criptography
Criptography
Sajan Sahu
Cryptography
Cryptography
research30
Public key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
Cryptography
Cryptography
Sagar Janagonda
Cryptography
Cryptography
herrberk
Caesar cipher
Caesar cipher
Technical Hub
Cryptography
Cryptography
悖忰悋 悋惶悋惘
Cryptography basices
Cryptography basices
Siddique Ibrahim
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
Encryption presentation final
Encryption presentation final
adrigee12
Advanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Cryptography and network security
Cryptography and network security
Mahipesh Satija
Encryption
Encryption
Syed Taimoor Hussain Shah
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
ARYANUNIVERSE
Cryptography
Cryptography
Vicky Kamboj
Cryptography
Cryptography
Vishalya Dulam
Cryptography
Cryptography
Sandip kumar
Overview of cryptography
Overview of cryptography
Roshan Chaudhary
Cryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
Encryption
Encryption
Nitin Parbhakar
Cryptography and network security
Cryptography and network security
Mathan Gopal
Cryptography
Cryptography
okolo chukwudumebi prince
Data encryption
Data encryption
Deepam Goyal
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Swati Nagpal
Encryption And Decryption
Encryption And Decryption
NA
Results presentation 4 q13_2013_eng_vfinal
Results presentation 4 q13_2013_eng_vfinal
LPS Brasil - Consultoria de Im坦veis S.A.
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners / Financial Technology Partners

More Related Content

What's hot (20)

Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
Encryption presentation final
Encryption presentation final
adrigee12
Advanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Cryptography and network security
Cryptography and network security
Mahipesh Satija
Encryption
Encryption
Syed Taimoor Hussain Shah
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
ARYANUNIVERSE
Cryptography
Cryptography
Vicky Kamboj
Cryptography
Cryptography
Vishalya Dulam
Cryptography
Cryptography
Sandip kumar
Overview of cryptography
Overview of cryptography
Roshan Chaudhary
Cryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
Encryption
Encryption
Nitin Parbhakar
Cryptography and network security
Cryptography and network security
Mathan Gopal
Cryptography
Cryptography
okolo chukwudumebi prince
Data encryption
Data encryption
Deepam Goyal
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Swati Nagpal
Encryption And Decryption
Encryption And Decryption
NA
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
Encryption presentation final
Encryption presentation final
adrigee12
Advanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Cryptography and network security
Cryptography and network security
Mahipesh Satija
Information Security & Cryptography
Information Security & Cryptography
Arun ACE
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
ARYANUNIVERSE
Overview of cryptography
Overview of cryptography
Roshan Chaudhary
Cryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
Dr. SURBHI SAROHA
Cryptography and network security
Cryptography and network security
Mathan Gopal
Data encryption
Data encryption
Deepam Goyal
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Swati Nagpal
Encryption And Decryption
Encryption And Decryption
NA

Viewers also liked (8)

Results presentation 4 q13_2013_eng_vfinal
Results presentation 4 q13_2013_eng_vfinal
LPS Brasil - Consultoria de Im坦veis S.A.
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners / Financial Technology Partners
Secure electronic transaction (set)
Secure electronic transaction (set)
Agn Chomentauskait
Network security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce security
Nuth Otanasap
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
Security in E-commerce
Security in E-commerce
m8817
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners / Financial Technology Partners
Secure electronic transaction (set)
Secure electronic transaction (set)
Agn Chomentauskait
Network security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce security
Nuth Otanasap
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
Security in E-commerce
Security in E-commerce
m8817
Ad

Similar to Group 6 (20)

Cryptography ppt
Cryptography ppt
Anubhav Sokhal
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
Network security and cryptography
Network security and cryptography
Pavithra renu
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
kushal37073
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
Analysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
Cryptography ppt
Cryptography ppt
OECLIB Odisha Electronics Control Library
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
ijsrd.com
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
Network security and cryptography
Network security and cryptography
Pavithra renu
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
PresentationonCRYPTOGRvvvvvvvvvvvAPHYppt.ppt
kushal37073
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
Introduction to Cryptography CYB 303.pptx
Introduction to Cryptography CYB 303.pptx
Abolarinwa
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
PresentationonCRYPTOGRAPHYppt.ppt - Read-Only - Compatibility Mode.ppt
so6281019
Analysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
haymanottaddess2015m
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
ijsrd.com
Ad

Group 6

  • 2. Introduction To Basic Encryption and Decryption The term Cryptography means the concept of encryption and decryption together. Cryptography is the technique in which the original plain text message is encrypted i.e. converted into a coded form called cipher text at the senders end, which is then transmitted to the receiver.
  • 3. The receiver then decrypts i.e. converts the cipher text back into the plain text to get the original message back. Cryptography is also called as an art or technique to achieve the secure communication between the communicating parties by encoding the messages between them such that no 3rd party can gain anything useful out of interception.
  • 4. Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization. Cryptography is one of the essential technologies used in building a secure VPN. Different applications of the same basic algorithms can provide both encryption that keeps data secret and authentication that ensures the two security peers in a VPN are who they claim to be. This chapter introduces some basic concepts in cryptography and demonstrates how they can be used in practice to provide data confidentiality. The next chapter continues this theme with a discussion of mutual authentication using cryptographic algorithms.
  • 6. Symmetric-key cryptography is also known as a secret- key, single key or private key. An encryption system in which the sender and receiver of a message share a single, common key that is used to encrypt and decrypt the message. Symmetric-key systems are simpler and faster, but their main drawback is that the two parties must somehow exchange the key in a secure way. Public-key encryption avoids this problem because the public key can be distributed in a non-secure way, and the private key is never transmitted.
  • 8. Disadvantages of symmetric key: A symmetric-key algorithm has two major disadvantages. 1) Each pair of users must have a unique symmetric key. This means that if N people in the world want to use this method, there needs to be N(N -1)/2 symmetric keys. For eg: for 1 thousand people to communicate, 1000* 999 /2 =4,99,500 (4 lakhs 99 thousand and five hundred) symmetric keys are needed. The distribution of the keys between two parties can be difficult. 2) The sender needs to exchange the key to the receiver. It may be hijacked in between.
  • 9. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved cryptographic algorithm as required by FIPS 140-1. Qualifications. The cryptographic algorithm specified in this standard transforms a 64-bit binary value into a unique 64-bit binary value based on a 56-bit variable. Data Encryption Standard
  • 10. The algorithm is designed to encipher and decipher blocks of data consisting of 64 bits under control of a 64-bit key A block to be enciphered is subjected to an initial permutation IP and then to a complex key- dependent computation and finally to a permutation which is the inverse of the initial permutation IP-1. Introduction
  • 11. Permutation is an operation performed by a function, which moves an element at place j to the place k. The key-dependent computation can be simply defined in terms of a function f, called the cipher function, and a function KS, called the key schedule. First, a description of the computation.