13
SUBMITTED BY: SUBMITTED TO: ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.) CRYPTOGRAPHY: SECURING THE INFORMATION AGE

Cryptography: Securing the Information Age

Embed Size (px)

DESCRIPTION

Cryptography: Securing the Information Age. SUBMITTED BY: SUBMITTED TO: ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.). Agenda. Definitions - PowerPoint PPT Presentation

Citation preview

Page 1: Cryptography: Securing the Information Age

SUBMITTED BY: SUBMITTED TO:ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.)

SUBMITTED BY: SUBMITTED TO:ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.)

CRYPTOGRAPHY: SECURING THE INFORMATION AGE

CRYPTOGRAPHY: SECURING THE INFORMATION AGE

Page 2: Cryptography: Securing the Information Age

AgendaAgenda

Definitions

Why cryptography is important?

Available technologies

Benefits & problems

Page 3: Cryptography: Securing the Information Age

Essential TermsEssential Terms

Cryptography EncryptionPlain text Cipher text

DecryptionCipher text Plain text

Cryptanalysis

Cryptology

Page 4: Cryptography: Securing the Information Age

Information Security for…Information Security for…

Defending against external/internal hackers

Defending against industrial espionage

Securing E-commerce

Securing bank accounts/electronic transfers

Securing intellectual property

Avoiding liability

Page 5: Cryptography: Securing the Information Age

Types of Secret WritingTypes of Secret Writing

Secret writing

Steganography Cryptography

Page 6: Cryptography: Securing the Information Age

SteganographySteganography

Steganography – covered writing – is an art of hiding information

Popular contemporary steganographic technologies hide information in images

Page 7: Cryptography: Securing the Information Age

Hiding information in pictures

Hiding information in pictures

Image in which to hide another image

Image to hide within the other image

Page 8: Cryptography: Securing the Information Age

Retrieving information from pictures

Retrieving information from pictures

Image with other hidden within

Recreated image

Page 9: Cryptography: Securing the Information Age

Types of Secret WritingTypes of Secret Writing

Secret writing

Steganography Cryptography

Substitution Transposition

Code

Cipher

Page 10: Cryptography: Securing the Information Age

Benefits of Cryptographic Technologies

Benefits of Cryptographic Technologies

Data hiding

Data integrity Authentication of

message originator

Electronic certification and digital signature

Page 11: Cryptography: Securing the Information Age

Potential Problems with Cryptographic Technologies?

Potential Problems with Cryptographic Technologies?

False sense of security if badly implemented

Government regulation of cryptographic technologies/export restrictions

Encryption prohibited in some countries

Page 12: Cryptography: Securing the Information Age

How Secure are Today’s Technologies?

How Secure are Today’s Technologies?

Encryption does not guarantee security!

Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:– Viruses, worms, hackers, etc.– Unauthorized physical access to secret

data

Cryptography is only one element of comprehensive computer security

Page 13: Cryptography: Securing the Information Age

DOUBTS…???DOUBTS…???

Your questions are welcome!