This document Security and Cryptography Technical PPT presents three ways for strengthening public key cryptosystems in a way that they become secure against ciphertext attacks. The first is strengthening method, based on one-way hash functions, the second on universal hash functions, and the third on digital signature schemes.
There are two kinds of cryptographic security, computational security and unconditional security. Cryptography occurs in a physical world of communication where nobody can have complete information about system state.
Using a public key system, this technique provides secure messages transmission to exchange secret keys. Ranging from secure commerce and payments to private communications and protecting passwords, many aspects to security and applications are described, one among is cryptography. Security is the protection against loss, danger, and criminals. It has to be compared and contrasted with continuity, safety, and reliability.
Cryptography is study of protecting information. Today, cryptography is meant to be a branch of both computer science and mathematics. It is affiliated with information theory, engineering, and computer security. This technology is applied in many fields like security of ATM cards, computer passwords, and electronic commerce.
Cryptography is closely referred to encryption. It is the process of converting plaintext into ciphertext or conversion of ordinary information into unintelligible gibberish. Conversion of unintelligible ciphertext to plaintext is termed as decryption. Cipher is a pair of algorithm that creates the encryption and reverses the decryption. It is the technology of writing in secret code.
Conclusion:
This document describes how cryptography operates. It is an interesting field where the work is done in secret. Time is the only genuine test of cryptography. The strength of cryptography depends on the choice of the keys. Cryptographic schemes have employed many trust models like Kerberos. Secrecy is not the key to best cryptography, but the best algorithms are those which are well-documented and well-known.
Download Security and Cryptography Technical PPT.