Cryptography: Securing the Information Age
-
Upload
christopher-anania -
Category
Documents
-
view
29 -
download
1
description
Transcript of Cryptography: Securing the Information Age
![Page 1: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/1.jpg)
SUBMITTED BY: SUBMITTED TO:ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.)
SUBMITTED BY: SUBMITTED TO:ANAND MAHALAHA Miss. A.A. KUJUR 0601IT081006 (HOD I.T.)
CRYPTOGRAPHY: SECURING THE INFORMATION AGE
CRYPTOGRAPHY: SECURING THE INFORMATION AGE
![Page 2: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/2.jpg)
AgendaAgenda
Definitions
Why cryptography is important?
Available technologies
Benefits & problems
![Page 3: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/3.jpg)
Essential TermsEssential Terms
Cryptography EncryptionPlain text Cipher text
DecryptionCipher text Plain text
Cryptanalysis
Cryptology
![Page 4: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/4.jpg)
Information Security for…Information Security for…
Defending against external/internal hackers
Defending against industrial espionage
Securing E-commerce
Securing bank accounts/electronic transfers
Securing intellectual property
Avoiding liability
![Page 5: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/5.jpg)
Types of Secret WritingTypes of Secret Writing
Secret writing
Steganography Cryptography
![Page 6: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/6.jpg)
SteganographySteganography
Steganography – covered writing – is an art of hiding information
Popular contemporary steganographic technologies hide information in images
![Page 7: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/7.jpg)
Hiding information in pictures
Hiding information in pictures
Image in which to hide another image
Image to hide within the other image
![Page 8: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/8.jpg)
Retrieving information from pictures
Retrieving information from pictures
Image with other hidden within
Recreated image
![Page 9: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/9.jpg)
Types of Secret WritingTypes of Secret Writing
Secret writing
Steganography Cryptography
Substitution Transposition
Code
Cipher
![Page 10: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/10.jpg)
Benefits of Cryptographic Technologies
Benefits of Cryptographic Technologies
Data hiding
Data integrity Authentication of
message originator
Electronic certification and digital signature
![Page 11: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/11.jpg)
Potential Problems with Cryptographic Technologies?
Potential Problems with Cryptographic Technologies?
False sense of security if badly implemented
Government regulation of cryptographic technologies/export restrictions
Encryption prohibited in some countries
![Page 12: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/12.jpg)
How Secure are Today’s Technologies?
How Secure are Today’s Technologies?
Encryption does not guarantee security!
Many ways to beat a crypto system NOT dependent on cryptanalysis, such as:– Viruses, worms, hackers, etc.– Unauthorized physical access to secret
data
Cryptography is only one element of comprehensive computer security
![Page 13: Cryptography: Securing the Information Age](https://reader036.fdocuments.net/reader036/viewer/2022062421/56812a7d550346895d8e0a3d/html5/thumbnails/13.jpg)
DOUBTS…???DOUBTS…???
Your questions are welcome!