Cryptography. By: Alejandra Barroso- Araujo.
What is Cryptography?. Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos , which means hidden..
Why do people use cryptography?. Cryptography is used to secure transactions and communications, safeguard personal identifiable information (PII) and other confidential data, authenticate identity, prevent document tampering, and establish trust between servers..
More about cryptography?. In our computer-centric world, cryptography is most often associated with scrambling ordinary text, known as plain text, which is sometimes referred to as cleartext..
Four objectives:. Confidentiality. The information cannot be understood by anyone for whom it was unintended. Integrity.The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. Non-repudiation. The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information. Authentication. The sender and receiver can confirm each other's identity and the origin/destination of the information..
Cryptographic algorithms:. Cryptosystems use a set of procedures known as cryptographic algorithms, or ciphers, to encrypt and decrypt messages to secure communications among computer systems, devices and applications..
Caesar Cipher. In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet..
Two processes:. Encryption Decryption.
Two processes: Encryption. Encryption is the process of converting or scrambling data and information into an unreadable, encoded version that can only be read with authorized access. Encryption is a widely used security tool that can prevent the interception of sensitive data, either while stored in files or while in transit across networks..
Two processes: Decryption. Decryption is a process that transforms encrypted information into its original format..
Encryption. .46. Shifts to the left.
Encryption. 1 st step: Create your plaintext 2 nd step: Create a key.
Encryption. Plaintext: HELLO Key: 2.
Shift alphabet:. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C KEY: 2.
Shift alphabet:. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C KEY: 2.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z.
ciphertext: J. Encrypting. Plaintext: HELLO A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.
Decryption. .46. Shifts to the right.
Shift alphabet. C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.
Shit alphabet. C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.
Ciphertext: JGNNQ. Decryption. E. LL. O.
References. www.techtarget.com www.hypr.com . www.cisco.com . www.entrust.com . https://en.wikipedia.org.