PowerPoint Presentation

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

Introduction to Cryptographic Algorithms. Explore the fascinating world of cryptography, and learn how it secures our digital world. We will delve into the key types of cryptographic algorithms: symmetric and asymmetric..

Scene 2 (14s)

What is Cryptography?. The art of securing information by encoding it to protect its confidentiality, integrity, and authenticity..

Scene 3 (27s)

Why Cryptographic Algorithms Matter. 1. Data Confidentiality.

Scene 4 (42s)

Types of Cryptographic Algorithms. Symmetric-key.

Scene 5 (58s)

Symmetric Cryptographic Algorithms. Examples: AES, DES..

Scene 6 (1m 9s)

How Symmetric Encryption Works. 1. Plaintext. 2. Encryption (with key).

Scene 7 (1m 20s)

Asymmetric Cryptographic Algorithms. Examples: RSA, ECC.

Scene 8 (1m 32s)

How Asymmetric Encryption Works. Plaintext. Encryption (with public key).

Scene 9 (1m 45s)

Symmetric vs. Asymmetric Cryptography. 1. Key Usage.

Scene 10 (2m 2s)

Key Takeaways. Cryptography is essential for secure communication, data integrity, and authentication in a digital world..

Scene 11 (2m 17s)

Symmetric Encryption: Concepts, History, and Applications.

Scene 12 (2m 26s)

Introduction to Cryptographic Algorithms. Key Categories: - Symmetric Encryption: Same key for encryption and decryption. - Asymmetric Encryption: Different keys for encryption (public) and decryption (private). - Hybrid Systems: Combine symmetric and asymmetric methods for efficiency and security..

Scene 13 (2m 40s)

Symmetric Encryption Basics. Uses the same key for encryption (E) and decryption (D). Faster and suitable for large data volumes. Mathematical Representation: Encryption: C = E(M, K) Decryption: M = D(C, K) Key Challenge: Securely sharing the secret key..

Scene 14 (2m 54s)

[image] A diagram of a person and person working on computers Description automatically generated.

Scene 15 (3m 2s)

XOR Functionality in Symmetric Encryption. Explanation: - XOR (Exclusive OR) is a fundamental operation in encryption. - Bit-level transformation: A ⊕ B Example: - Input 1: 1010 (Message) - Input 2: 1100 (Key) - XOR Result (Ciphertext): 0110 - Decryption (XOR Ciphertext with Key): 1010.

Scene 16 (3m 16s)

Historical Milestones in Symmetric Encryption. 1. Data Encryption Standard (DES): - Developed by IBM (1970s), 56-bit key, 64-bit block size. - Vulnerable by 1998 (broken in 56 hours). 2. Triple DES (3DES): - Enhanced DES by applying encryption three times. - Stronger but inefficient with modern computing power. 3. Advanced Encryption Standard (AES): - Adopted in 2002. - Key lengths: 128, 192, 256 bits..

Scene 17 (3m 37s)

DES and Its Vulnerability. Features: - Key length: 56 bits. - Popular for 20 years. Weakness: - Limited key size led to brute-force vulnerabilities. Example: - Ciphertext: 3DE45ACB - Key: Small range allowed cracking in 56 hours (EFF, 1998)..

Scene 18 (3m 52s)

Triple DES (3DES). Mechanism: - Encrypt → Decrypt → Encrypt. - Key size: 168 bits. Challenges: - Computationally intensive. - Vulnerable with increasing processing power. Example: - Input Message: 01010101 - Key 1, Key 2, Key 3 used sequentially..

Scene 19 (4m 6s)

Advanced Encryption Standard (AES). Introduction: - Federal standard since 2002. - Designed to replace DES and 3DES. Features: - Key sizes: 128, 192, 256 bits. - Block size: 128 bits. Advantages: - Robust against brute force. - Efficient for modern computing..

Scene 20 (4m 22s)

Conclusion. Symmetric encryption remains vital for fast and efficient security. - Evolution from DES to AES highlights the impact of technological advancements. - XOR and block cipher techniques underpin its operation..

Scene 21 (4m 34s)

Asymmetric Encryption. Public key cryptography.

Scene 22 (4m 40s)

Asymmetric Encryption. Public Key: Shared with everyone to encrypt data. Private Key: Kept secret and used to decrypt data..

Scene 23 (4m 50s)

Why Asymmetric Encryption?. Eliminates the need for pre-sharing secret keys (as required in symmetric encryption). Enables secure communication over untrusted channels. Used extensively in secure protocols like HTTPS, SSL/TLS, and email encryption..

Scene 24 (5m 4s)

Introduction to RSA(Rivest-Shamir-Adleman). It use two very basic maths concepts: Modular Arithmetic Prime Numbers.

Scene 25 (5m 13s)

How RSA Works. Step 1: Select Big Prime Numbers: p = 2 & q = 7 Step 2: Calculate N: N = p * q Step 3: Calculate O: O = (p-1) * (q-1) Step 4: Calculate e: Condition 1: 1 < e < O Condition 2: e should be coprime with N and O. (the GCD should be 1) We choose e = 5 Your public Key: (e, N) Calculate d: Condition : d*e(mod O) = 1 In this case d could be 5, 11, 17, We choose 11. Your private Key: (d, N).

Scene 26 (5m 37s)

Encrypting. Suppose my Data is 2. Encrypted data Public key = (5, 14) 25 mod 14 = 4 (This is my encrypted text) Decryption Private Key = (11, 14) 411 mod 14 = 2.

Scene 27 (5m 49s)

Why it is secure. Difficulty of Factorizing N into two prime numbers p and q. Key size is usually 2048 bit. Classical Algorithm have exponential time complexity. General Number Field Sieve (GNFS) needs billions of years..

Scene 28 (6m 2s)

[image] Number Field Sieve exp(1.9 log(n1/3) * log(log(n))2/3) Shor's Algorithm 500 1000 log(n3) 1500 2000 Number of bits.

Scene 29 (6m 10s)

Applications of Cryptography.

Scene 30 (6m 16s)

Online Banking and E-commerce. encrypting sensitive data like card details, bank account numbers, and passwords..

Scene 31 (6m 26s)

Messaging Apps. Apps like WhatsApp use cryptography called end-to-end encryption..

Scene 32 (6m 34s)

Secure Websites (HTTPS). information you type, like login credentials or personal details, is secure. It’s done through SSL/TLS protocols..

Scene 33 (6m 48s)

Digital Signatures. Digital signatures act like a stamp of authenticity for digital files..

Scene 34 (6m 58s)

Cloud Storage. Cryptography protects files uploaded to cloud services (like Google Drive or Dropbox)..

Scene 35 (7m 7s)

[image]. Government and Military Communication. Protect confidential information, ensuring that sensitive communications and plans remain secret..

Scene 36 (7m 16s)

Wi-Fi Security. encryption protocols like WPA2, which protect your internet connection from unauthorized users..

Scene 37 (7m 26s)

Blockchain and Cryptocurrencies. Secures cryptocurrency transactions. It also protects your cryptocurrency wallet with a private key..

Scene 38 (7m 35s)

[image] VOTE. Electronic Voting. votes are securely transmitted and cannot be altered or traced back to the voter, maintaining privacy..