Cryptography

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Cryptography. By: Alejandra Barroso- Araujo.

Scene 2 (16s)

What is Cryptography?. Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos , which means hidden..

Scene 3 (36s)

Why do people use cryptography?. Cryptography is used to secure transactions and communications, safeguard personal identifiable information (PII) and other confidential data, authenticate identity, prevent document tampering, and establish trust between servers..

Scene 4 (1m 5s)

More about cryptography?. In our computer-centric world, cryptography is most often associated with scrambling ordinary text, known as plain text, which is sometimes referred to as cleartext..

Scene 5 (1m 25s)

Four objectives:. Confidentiality. The information cannot be understood by anyone for whom it was unintended. Integrity.The information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected. Non-repudiation. The creator/sender of the information cannot deny at a later stage their intentions in the creation or transmission of the information. Authentication. The sender and receiver can confirm each other's identity and the origin/destination of the information..

Scene 6 (2m 32s)

Cryptographic algorithms:. Cryptosystems use a set of procedures known as cryptographic algorithms, or ciphers, to encrypt and decrypt messages to secure communications among computer systems, devices and applications..

Scene 7 (2m 52s)

Caesar Cipher. In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet..

Scene 8 (3m 29s)

Two processes:. Encryption Decryption.

Scene 9 (3m 38s)

Two processes: Encryption. Encryption is the process of converting or scrambling data and information into an unreadable, encoded version that can only be read with authorized access. Encryption is a widely used security tool that can prevent the interception of sensitive data, either while stored in files or while in transit across networks..

Scene 10 (4m 8s)

Two processes: Decryption. Decryption is a process that transforms encrypted information into its original format..

Scene 11 (4m 17s)

Encryption. .46. Shifts to the left.

Scene 12 (4m 25s)

Encryption. 1 st step: Create your plaintext 2 nd step: Create a key.

Scene 13 (4m 35s)

Encryption. Plaintext: HELLO Key: 2.

Scene 14 (5m 6s)

Shift alphabet:. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C KEY: 2.

Scene 15 (5m 33s)

Shift alphabet:. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C KEY: 2.

Scene 16 (5m 47s)

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z.

Scene 17 (6m 9s)

ciphertext: J. Encrypting. Plaintext: HELLO A B C D E F G H I J K L M N O P Q R S T U V W X Y Z C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.

Scene 18 (7m 8s)

Decryption. .46. Shifts to the right.

Scene 19 (7m 15s)

Shift alphabet. C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.

Scene 20 (7m 42s)

Shit alphabet. C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.

Scene 21 (7m 56s)

C D E F G H I J K L M N O P Q R S T U V W X Y Z A B.

Scene 22 (8m 36s)

Ciphertext: JGNNQ. Decryption. E. LL. O.

Scene 23 (10m 7s)

References. www.techtarget.com www.hypr.com . www.cisco.com . www.entrust.com . https://en.wikipedia.org.