0% found this document useful (0 votes)
33 views6 pages

Cryptography Basics PPT

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views6 pages

Cryptography Basics PPT

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CRYPTOGRAPHY

BASICS
ISO/IEC 27001 – GUIDELINES
FOR CYBERSECURITY

FABRIKAM
CRYPTOGRAPHY
 CONFIDENTIALITY
 INTEGRITY
 NON-REPUDIATION

Caesar Cipher

Enigma machine
FABRIKAM
CRYPTOGRAPHY
CONCEPTS
CIPHER – algorithm used to perform the
encryption
KEY – information that determines how the
algorithm works

A. Kerckhoffs’s Principle

“a cryptosystem should be secure


even if everything about the system,
except the key, is public knowledge”

FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised

FABRIKAM
PUBLIC KEY CRYPTOGRAPHY

Source:
https://dusted.codes

FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised

FABRIKAM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy