computer applications in

Upload: repsia-mary

Post on 06-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Computer Applications In

    1/16

    COMPUTER

    APPLICATIONS INBUSINESS

    PRESENTATION ON -

    CRYPTOGRAPHY

    1

  • 8/3/2019 Computer Applications In

    2/16

    INTRODUCTION

    Cryptography is a field of science involved with the encryption

    and decryption of data such that when a data is encrypted with

    a password, it is rendered unreadable or completely unusable

    until it is decrypted by either the same password or another of

    a suitable nature.

    It would be preferable that the password for decryption be held

    only by the intended viewers such that the encrypted data

    becomes completely secure and is only accessible to those

    who are supposed to access it.

    Without the correct password for decryption, a hijacker is

    unable to use the encrypted data in any way whatsoever unlesshe manages to crack the algorithm used to encrypt the data.

    Strong algorithms will require hundreds or thousands of years

    with current hardware to crack while the weakest ones take

    average hardware slightly over a few seconds to break.2

  • 8/3/2019 Computer Applications In

    3/16

    HISTORY OF CRYPTOGRAPHY

    3

    Julius Caesar (who was

    believed to pioneer

    cryptography) invented a

    code language called the

    Caesar cipher. It was an

    easily broken code, but in atime where cryptography

    was unheard of, it became a

    major factor in him winning

    his wars.

    The Caesar cipher worked

    simply by shifting the letters

    in the alphabet by an

    arbitrary number of

    positions by the setter of the

    code.

  • 8/3/2019 Computer Applications In

    4/16

    4

    Symmetric Cryptography It

    is the kind of cryptography

    where one password is used

    to both encrypt and decrypt a

    message or any other forms ofdata.

    Asymmetric Cryptography -

    Commonly called public key

    cryptography, it involves a

    public key, which is used to

    encrypt the message, and aseparate private key, which is

    used to decrypt the message.

    This being an information age,

    the amount of data that we

    deal with everyday is a

    frighteningly huge amount.

    Some of the data that wetransmit over communication

    channels are meant only for

    the receiver to read and view

    but as these channels are

    open to the public, there is no

    stopping it from beingaccessed by anybody who

    wants to see it for whatever

    ulterior motive they may have.

    TYPES OF

    CRYPTOGRAPHY

    CRYPTOGRAPHY

    AND YOU

  • 8/3/2019 Computer Applications In

    5/16

    5

    ENCRYPTION &

    DECRYPTION

    WHAT IS

    CRYPTO-GRAPHY

    STRONG

    CRYPTO-GRAPHY

    HOW

    DOESCRYPTO-

    GRAPHY

    WORK?

  • 8/3/2019 Computer Applications In

    6/16

    CONVENTIONAL

    CRYPTOGRAPHY

    6

    CAESARS

    CIPHER

    KEY

    MANAGEMENT

    &CONVENTION-

    AL

    ENCRYPTION

  • 8/3/2019 Computer Applications In

    7/16

    7

    PUBLIC KEY

    CRYPTOGRAPHY

    HOW PGP

    WORKS?

  • 8/3/2019 Computer Applications In

    8/16

    KEYS

    A key is a value that works with a cryptographic algorithm to

    produce a specific cipher text.

    Public key size and conventional cryptography's secret key size

    are totally unrelated.

    While the public and private keys are mathematically related,it's very difficult to derive the private key given only the public

    key; however, deriving the private key is always possible given

    enough time and computing power.

    Larger keys will be cryptographically secure for a longer period

    of time.

    Keys are stored in encrypted form. PGP stores the keys in twofiles on your hard disk; one for public keys and one for private

    keys. These files are called keyrings.

    8

  • 8/3/2019 Computer Applications In

    9/16

    DIGITAL SIGNATURES

    9

    SIMPLE SECURE

  • 8/3/2019 Computer Applications In

    10/16

    DIGITALCERTIFICATES

    CERTIFICATEDISTRI-BUTION

    CERTIFICATESERVERS

    PUBLIC KEYINFRASTRUC

    -TURES

    CERTIFICATEFORMATS

    PGPCERTIFICATE

    X.509CERTIFICATE

    10

  • 8/3/2019 Computer Applications In

    11/16

    PGP CERTIFICATE FORMAT

    11

    The PGP version

    number

    The certificate

    holders public

    key

    The certificate

    holdersinformation

    The digital

    signature of the

    certificate owner

    The certificates

    validity period

    The preferred

    symmetric

    encryption

    algorithm for the

    key

  • 8/3/2019 Computer Applications In

    12/16

    X.509 CERTIFICATE FORMAT

    12

    The X.509 version

    number

    The certificate

    holders public key

    The serial number of

    the certificate

    The certificateholders unique

    identifier

    The certificates

    validity period

    The unique name of

    the certificate issuer

    The digital signature

    of the issuer

    The signature

    algorithm identifier

  • 8/3/2019 Computer Applications In

    13/16

    VALIDITY& TRUST

    CHECKINGVALIDITY

    ESTABLISH-ING TRUST

    META &TRUSTED

    INTRODU-CERS

    TRUSTMODELS

    DIRECT

    TRUST

    HIERAR-CHIALTRUST

    WEB OF

    TRUST

    13

  • 8/3/2019 Computer Applications In

    14/16

    14

    CERTIFICATE

    REVOCATION

    KEY SPLITTING

    WHAT IS A

    PASSPHRASE?

  • 8/3/2019 Computer Applications In

    15/16

    CONCLUSION

    Cryptography is emerging as a very important tool in the field

    of security today.

    With security becoming a very important field in the world of

    today, cryptography is being catapulted into the limelight

    together with other methods of security. Indeed cryptography

    is one of the first lines of defense against hackers and crackers

    in todays world.

    Thus, it will stay important for a long time to come as it has for

    thousands of years since Caesar first invented the Caesar

    cipher in an era before the birth of Christ.

    15

  • 8/3/2019 Computer Applications In

    16/16

    GROUP

    MEMBERSAND

    THEIR

    ROLLN

    UMBERS

    SHREEKANT

    BADRI 162

    RIDDHISH

    BHAYANI 163

    FARHAN

    CHUNAWALA

    164

    YASH DAMANI

    165

    NORTON DAVID

    166

    SAHIL DHAMI -

    167

    16