0% found this document useful (0 votes)
30 views13 pages

Lecture 04 Cryptography

The document provides an overview of cryptography, detailing its purpose of converting plain text to cipher text for secure communication. It discusses two main types of cryptography: symmetric key cryptography, which uses a single key for both encryption and decryption, and asymmetric key cryptography, which employs a pair of public and private keys. Additionally, it highlights key concepts such as encryption, decryption, digital signatures, key exchange, and the role of TLS/SSL in securing internet communications.

Uploaded by

Khalid Baloch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views13 pages

Lecture 04 Cryptography

The document provides an overview of cryptography, detailing its purpose of converting plain text to cipher text for secure communication. It discusses two main types of cryptography: symmetric key cryptography, which uses a single key for both encryption and decryption, and asymmetric key cryptography, which employs a pair of public and private keys. Additionally, it highlights key concepts such as encryption, decryption, digital signatures, key exchange, and the role of TLS/SSL in securing internet communications.

Uploaded by

Khalid Baloch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Lecture 04

Cryptography
C O U R S E I N S T R U C T O R : M A M K I S H WA R
L E C T U R E R : D E PA R T M E N T O F I T & C S
I S L A M I A U N I V E R S I T Y B A H A WA L P U R
M S I N F O R M AT I O N T E C H N O L O G Y
Cryptography

 Cryptography is a technique in which plain text is


converted into cipher text and cipher text is
converted into plain text.
 Plain text(Readable text)
 Cipher text(Unreadable text)
 Cryptography is the science of secret writing.
 We use cryptography to achieve confidentiality.
 It protects the information from unauthorized person.
 It secure communication in the presence of third
parties.
 Cryptography gives the means to construct a secure
logical channel over an insecure physical connection.
Types of Cryptography

1) Symmetric key Cryptography


2) Asymmetric key Cryptography
3) Hashing
o Key is the string of bits used by cryptographic
algorithm to transfer plain text into cipher
text.
o Keys can be same or different while
performing encryption and decryption.
o Same keys=Symmetric key
o Different key=Asymmetric key
Symmetric Key

 The type of cryptography involves the use of single


key to encrypt and decrypt data.
 Both the sender and receiver use the same keys
which must be kept secret to maintain security.
 It is also called private key or secrete key
cryptography.
 As same key is used for encryption and decryption
less complexity occur in symmetric key cryptography.
 It is faster because complexity is low.
 Utilize less recourses so less secure.
 Transmit bulk of data.
Symmetric Encryption

Single-key encryption
Components of Symmetric Key

1. Plain Text
2. Cipher Text
3. Encryption Algorithm
4. Decryption Algorithm
5. Encryption
6. Decryption
7. Private Key
Asymmetric Key

 Asymmetric key is also called public key


cryptography.
 Uses a the pair of key a public key and a private key
to encrypt and decrypt data.
 The public key is available to anyone, while private
key is kept secret by the owner.
 As different key is used for encryption and
decryption more complexity occur in Asymmetric key
cryptography.
 It is slower because complexity is high.
 Utilize more recourses so more secure.
 Transmit small blocks of data.
Components of Asymmetric Key

1. Plain Text
2. Cipher Text
3. Encryption Algorithm
4. Decryption Algorithm
5. Encryption
6. Decryption
7. Private Key
8. Public Key
Key points in Cryptograpy

o Encryption
o Decryption
o Digital Signature
o Key Exchange
o SSL/TLS
Key points in Cryptograpy

 Encryption: The process of transferring information


from readable to unreadable format.
 Decryption: The process of transferring information
from unreadable to readable format.
 Digital signature: The receiver uses the sender public
key to prove that message is indeed signed by sender.
 Key Exchange: The process in which two parties
securely exchange keys.
o Symmetric key exchange: Both parties share the same
secrete key.
o Asymmetric key exchange: parties exchange public
keys, then use private keys for decryption.
TLS/SSL

 TLS/SSL: TLS(Transport Layer Security)


and SSL(Secure Sockets Layer) are
cryptographic protocols that provides
secure communication over the internet.
o Both TLS & SSL operates on the transport
layer (layer 4) of OSI model providing end
to end encryption and security for data
transmitted over internet.
o SSL & TLS secure data transmission
between client and server.

You might also like