Description: The Seminar Report Public Key Cryptography and Hash Functions Secret Key Cryptography talks about Cryptography and the purpose behind such a thing. This paper focuses on the multiple aspects pertaining to cryptography. The benefits and requirements of cryptography in various fields, particularly the internet, is explained. Secure communications data storage, identification and authentication and various other applied cryptographic concepts have been dealt with and explained in detail. The three general types of cryptographic schemes such as SECRET-KEY CRYPTOGRAPHY, PUBLIC-KEY CRYPTOGRAPHY AND HASH FUNCTIONS explained in detail.
The paper describes that Cryptography is the science of writing in secret code and has been in vogue since times immemorial; the first application of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Experts argue that cryptography emerged as a need after writing was invented, Cryptography is use in various departments military, espionage etc.
The paper explains that Public-key cryptography is the best and significant development in the field in the last 300-400 years. Modern PKC was first described by Stanford University professor Martin Hellmann and graduate student Whitfield Diffie in 1976. A two-key crypto system was presented by them in which two parties could engage in a secure communication over a non-secure communications channel without having to share a secret key.
It is suggested in the paper that nearly all modern multi-user computer and network operating systems use passwords to protect and authenticate users accessing computer and/or network resources. Although passwords are not kept on a host or server in plaintext but are generally encrypted using hash scheme.
Conclusion: The research paper ends on a conclusive note that Cryptography is all about ‘secure communications’. In data and telecommunications and many more industries where information is shared exchanged , cryptography is essential when communicating/sharing information over any untrusted medium, which includes any network, specifically the Internet.
Download Public Key Cryptography and Hash Functions Secret Key Cryptography Final Year Computer Science and Electronics Seminar Report with full Technical Presentation.