Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
40 views17 pages

The Emerging Role For Secret Communication

Cryptography involves secret writing and is used to securely transmit information over networks. It works by encrypting data during transmission using algorithms to scramble the information, then decrypting it upon receipt. Cryptography ensures secrecy of messages, verifies they are not altered in transit, and authenticates the sender. It has growing applications from online shopping to smart devices and vehicles. Future challenges include protecting against new forms of side channel attacks and securely enabling emerging technologies that rely on network connectivity.

Uploaded by

Ram Prasad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views17 pages

The Emerging Role For Secret Communication

Cryptography involves secret writing and is used to securely transmit information over networks. It works by encrypting data during transmission using algorithms to scramble the information, then decrypting it upon receipt. Cryptography ensures secrecy of messages, verifies they are not altered in transit, and authenticates the sender. It has growing applications from online shopping to smart devices and vehicles. Future challenges include protecting against new forms of side channel attacks and securely enabling emerging technologies that rely on network connectivity.

Uploaded by

Ram Prasad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

THE EMERGING ROLE FOR SECRET COMMUNICATION

What is cryptography?

cryptography means study of network security . Cryptography in the

greek means “secret writing” .

Introducing of cryptography:

First recorded use of cryptography for correspondence was by the

spartans who employed a cipher device called scytale to send any information in

secret
In networking

• The system deals with security during transmission of information .


• This transfer of information could be done through network .
• Commonly used technology is cryptography .
Why cryptography?

• People are afraid of entering their credit card number on a secure web site, but during
their vacation they had their card to an unknown barkeeper.

• People are afraid that internet power lines could be easily tapped. They should be
aware to that it can be tapped already today and that encryption is the only way to go.
What cryptography can do?

• Potentially, cryptography can hide information while it is in transit of storage. In


general cryptography can

Provide secrecy .

Authenticate that a message has not changed in transit.

Implicitly authenticate the sender.


How cryptography works

• The given data will be encrypted in bit-level decomposition.

B-bit image secret sharing


K 1 ×K 2
gray-s c ale image
Bit-lev el
dec ompos ition

enc ryption
enc ryption

2K 1 ×2K 2
gray-level
Dec ryption S hare S 1

Ou tput image
K 1xK 2
B-bit imag e 2K 1 ×2K 2
gray-level
2008/7 /25
S hare S 2
Encryption and decryption

• Encryption means changing plain text to cipher text .


• Decryption means changing cipher text to plain text .
General example in day to day life

Sending information:

• Here Alice is sender , Charlie is network and Bob is receiver .

• Here Alice wants to send the information for Bob through Charlie .
Encryption using alphabetically transposition and
decomposition

Julius Caesar: replaces each letter by another


one in the same order (shift)

For instance, (shift by 3) replace:


ABCDEFGHIJKLMNOPQRSTUVWXYZ

By

DEFGHIJKLMNOPQRSTUVWXYZABC

Example:
CRYPTOGRAPHY

Becomes FUBSWRJUDSKB
Secret code for bank card

ATM: Automatic teller machine

• For getting the security Encryption and

decryption takes place from user to main

memory
• Here encryptions and Decryptions acts as lockers for data
Properties of hiding schemes

Robustness

Indefectibility

Invisibility

Security
Future of cryptography

• Cryptography 2000 • Cryptography 2010


• Electronic road toll • Brave new pervasive worlds
• prevents cheating by drivers • Bridge sensors
• Protects privacy of drivers • Cleaning robots
• Car with internet access
• Smart street lamps
Future challenges

• Side channel attacks against embedded micro p

• new application domain for the security & crypto

• IT security in cars
conclusion

• Cryptography is necessary where ever the network is


being used . Network security cannot be obtained
without cryptography
Querries?
Thank you

You might also like