Applications of Cryptography
-
Upload
lamia-alam -
Category
Documents
-
view
8 -
download
0
description
Transcript of Applications of Cryptography
![Page 1: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/1.jpg)
Applications Of CryptographyLamia Alam
Roll No: 10
Course No. : CSE-6307
Course Name: Cryptography & Network Security
![Page 2: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/2.jpg)
Friday, April 21, 2023 2
Contents
IntroductionApplications of Cryptography
CSE-6301:Cryptography & Network Security
![Page 3: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/3.jpg)
Friday, April 21, 2023 3
IntroductionCryptography
the study of secret (crypto-) writing (-graphy); concerned with developing algorithms which
may be used to maintain:privacy or secrecy ;authentication or integrity;
CSE-6301:Cryptography & Network Security
![Page 4: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/4.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
4
Applications of Cryptography Secure Message Transmission Using Proxy-Signcryption
Integration of proxy signature & signcryption public key paradigms provides secure transmission;
Used for low power computers;
![Page 5: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/5.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
5
Applications of Cryptography
• Monitoring Communication• can impede the government's efforts to legitimately
perform electronic reconnaissance
![Page 6: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/6.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
6
• Fractional Observing of Data • Allows only part of the message to be
monitored but not all.
![Page 7: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/7.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
7
• Transferring Files on Network • Files that are to be exchanged between
users need to be protected against malicious users and attackers
![Page 8: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/8.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
8
• Certificates and Authentication
![Page 9: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/9.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
9
• Digital Signature and Authentication
![Page 10: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/10.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
10
• Quantum Key Distribution
![Page 11: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/11.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
11
• H. Time stamping
![Page 12: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/12.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
12
• I. Electronic Money
![Page 13: Applications of Cryptography](https://reader036.fdocuments.net/reader036/viewer/2022062423/563dbb77550346aa9aad6b59/html5/thumbnails/13.jpg)
Friday, April 21, 2023 CSE-6301:Cryptography & Network Security
13
• J. Disk Encryption