0% found this document useful (0 votes)
19 views

Cryptography_basics_ppt

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Cryptography_basics_ppt

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CRYPTOGRAPHY

BASICS
ISO/IEC 27001 – GUIDELINES
FOR CYBERSECURITY

FABRIKAM
CRYPTOGRAPHY
 CONFIDENTIALITY
 INTEGRITY
 NON-REPUDIATION

Caesar Cipher

Enigma machine
FABRIKAM
CRYPTOGRAPHY
CONCEPTS
CIPHER – algorithm used to perform the
encryption
KEY – information that determines how the
algorithm works

A. Kerckhoffs’s Principle

“a cryptosystem should be secure


even if everything about the system,
except the key, is public knowledge”

FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised

FABRIKAM
PUBLIC KEY CRYPTOGRAPHY

Source:
https://dusted.codes

FABRIKAM
ASYMETRIC (PUBLIC KEY)
CRYPTOGRAPHY
(popular algorithms: RSA, DSA, EL GAMAL, ELLIPTIC
CURVE)
- 2 keys (public and private) SYMETRIC CRYPTOGRAPHY
- Only public key is made available (popular algorithm: AES – AES-128,
- If a participant leaves only his key is invalidated AES-192, AES-256)
- Adding new participants is easy (generate a pair of - Single shared key (to encrypt and
keys) decrypt)
- Fast
- Difficult to distribute the key to all
participants
- If one participant leaves the key is
compromised

FABRIKAM

You might also like