1 / 13

Cryptography: Securing the Information Age

Cryptography: Securing the Information Age. SUBMITTED BY: SUBMITTED TO: ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.). Agenda. Definitions

Download Presentation

Cryptography: Securing the Information Age

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography: Securing the Information Age SUBMITTED BY:SUBMITTED TO: ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.)

  2. Agenda • Definitions • Why cryptography is important? • Available technologies • Benefits & problems

  3. Essential Terms • Cryptography Encryption Plain text  Cipher text • Decryption Cipher text  Plain text • Cryptanalysis • Cryptology Secret writing

  4. Information Security for… • Defending against external/internal hackers • Defending against industrial espionage • Securing E-commerce • Securing bank accounts/electronic transfers • Securing intellectual property • Avoiding liability

  5. Types of Secret Writing Secret writing Steganography Cryptography

  6. Steganography • Steganography – covered writing – is an art of hiding information • Popular contemporary steganographic technologies hide information in images

  7. Hiding information in pictures Image in which to hide another image Image to hide within the other image

  8. Retrieving information from pictures Image with other hidden within Recreated image

  9. Types of Secret Writing Secret writing Cryptography Steganography Substitution Transposition Code Cipher

  10. Benefits of Cryptographic Technologies • Data hiding • Data integrity • Authentication of message originator • Electronic certification and digital signature

  11. Potential Problems with Cryptographic Technologies? • False sense of security if badly implemented • Government regulation of cryptographic technologies/export restrictions • Encryption prohibited in some countries

  12. How Secure are Today’s Technologies? • Encryption does not guarantee security! • Many ways to beat a crypto system NOT dependent on cryptanalysis, such as: • Viruses, worms, hackers, etc. • Unauthorized physical access to secret data • Cryptography is only one element of comprehensive computer security

  13. DOUBTS…??? • Your questions are welcome!

More Related