26
CRYPTOGRAPHY AND ENCRYPTION Ancy mariam babu Vit university

Cryptography and encryption

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Cryptography and  encryption

CRYPTOGRAPHY AND ENCRYPTION

Ancy mariam babuVit university

Page 2: Cryptography and  encryption

INTRODUCTION the need of multimedia secure

transmission need of more security What is cryptography…???

Page 3: Cryptography and  encryption

CRYPTOGRAPHY CRYPTOGRAPHY IS THE

SCIENCE OF INFORMATION SECURITY

The word is derived from greek kryptos means hidden

Cryptography includes the techniques such as microdotes, merging words with images, other ways to hide information in storage or transit

Objectives of cryptography are

confidentiality

integrity

authentication

Page 4: Cryptography and  encryption

COMPONENTS OF CRYPTOGRAPHY

Encryption : it is the process of converting a plain text into (unrecognizable) cipher text.

For strong encryption: two attributes -confusion -diffussion Decryption: it is the process of changing

back the cipher text to plain text.

Page 5: Cryptography and  encryption

COMPONENTS OF CRYPTOGRAPHY

Page 6: Cryptography and  encryption

CATEGORIES OF CRYPTOGRAPHY

Page 7: Cryptography and  encryption

SYMMETRIC KEY CRYPTOGRAPHY

A single common key is used for encode and decode of messages

Both sender and receiver must know the common key

The common key need to be exchange before hand by some other secure method

Symmetric key encryption is fast and simple But the key management is impractical

Page 8: Cryptography and  encryption

SYMMETRIC KEY CRYPTOGRAPHY

Page 9: Cryptography and  encryption

ASSYMETRIC KEY CRYPTOGRAPHY

Two different key is used for encryption and decryption

Public key is used for encryption and private key is used for decryption

Each user has a public key and corresponding private key.

Page 10: Cryptography and  encryption

ASSYMETRIC KEY CRYPTOGRAPHY

Page 11: Cryptography and  encryption

ENCRYPTION… Encryption is the

process of converting plain text into cipher text.

Done by using encryption algorithms

Key is used Two types:

-Asymmetric

-symmetric

Page 12: Cryptography and  encryption

ASYMMETRIC ENCRYPTION

Page 13: Cryptography and  encryption

SYMMETRIC ENCRYPTION

Page 14: Cryptography and  encryption

WHY USE ENCRYPTION Authentication

-protects personal data such as passwords Privacy

-provides for confidentiality of private information

Integraty

-ensures that a document or file not has been altered.

Accountability

- prevents denial or plagarism

Page 15: Cryptography and  encryption

EXAMPLES OF ENCRYPTION

Web browser encryption Email encryption Hard drive encryption Operating system protection

Page 16: Cryptography and  encryption

VIDEO ENCRYPTION Encryption on video Twotypes

- independent encryption

-joint compression and encryption

Page 17: Cryptography and  encryption

INDEPENDENT ENCRYPTION

Both encryption and compression done seperatly

Any compression standard can use for compression

For encryption, can use either lightweight encription or heavyweight encryption

Page 18: Cryptography and  encryption

INDEPENDENT ENCRYPTION

Page 19: Cryptography and  encryption

HEAVY WEIGHT ENCRYPTION

Video encryption technique

Huge computation overhead

More secure

Page 20: Cryptography and  encryption

HEAVYWEIGHT ENCRYPTION TECHNIQUES Examples Des:

- data encryption standard for electronic encryption

-short key length and symmetric key block cipher

Aes:

-advanced encryption algorithm

- symmetric key encryption Rsa:

-public key scheme

- difficulty for factoring large number

-secure

Page 21: Cryptography and  encryption

LIGHTWEIGHT ENCRYPTION

Video encryption technique

Faster and simple Less complexity Less time cosumption

Page 22: Cryptography and  encryption

LIGHTWEIGHT ENCRYPTION TECHNIQUES examples Rc6 Idea hb2 Present Tea

Page 23: Cryptography and  encryption

JOINT COMPRESSION AND ENCRYPTION TECHNIQUE

Both encryption and compression integrates as a single step

System obtain multiple level of security Exaples

1.vea

2.rvea Two types

1.compression before encryption

2. compression after encryption

Page 24: Cryptography and  encryption

COMPRESSION BEFORE ENCRYPTION

Page 25: Cryptography and  encryption

COMPRESSION AFTER ENCRYPTION

Page 26: Cryptography and  encryption