0% found this document useful (0 votes)
534 views

Presentation 2

- The document discusses cryptography and steganography. It provides definitions and histories of cryptography and describes modern cryptography techniques. It also defines steganography, discusses types of steganography techniques like hiding messages in images, audio and video, and covers advantages and disadvantages of steganography. Applications of cryptography like credit cards and steganography like confidential communication are also mentioned.

Uploaded by

Rishav Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
534 views

Presentation 2

- The document discusses cryptography and steganography. It provides definitions and histories of cryptography and describes modern cryptography techniques. It also defines steganography, discusses types of steganography techniques like hiding messages in images, audio and video, and covers advantages and disadvantages of steganography. Applications of cryptography like credit cards and steganography like confidential communication are also mentioned.

Uploaded by

Rishav Roy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

TECHNO INDIA

COLLEGE OF
TECHNOLOGY
MEMBERS
RISHAV - 26
Click to add text KISHAN RABI DAS - 03
AMISHA SINHA - 47
ROHAN RAJESH MISHRA - 10
• WHAT IS CRYPTOGRAPHY
• HISTORY OF CRYTOGRAPHY
• MODERN CRYPTOGRAPHY
• APPLICATION OF CRYPTOGRAPHY
CONTENT • WHAT IS STEGANOGRAPHY
S • EVOLUTION OF STEGANOGRAPHY
• TYPES OF STEGANOGRAPHY
• ADVANTAGES AND DISADVANTAGE
• CONCLUSION
What is Cryptography?

• Cryptography is technique of securing information and


communications through use of codes so that only those
person for whom the information is intended can understand
it and process it. .

• The prefix “crypt” means “hidden” and suffix "graphy" means


“writing”.
HISTORY OF CRYPTOGRAPHY
• The origin of cryptography took place around 2000 B.C in Egypt.

Before the modern era, cryptography was concerned solely


with message confidentiality that is encryption conversion of messages
from a comprehensible form into an incomprehensible one and back
again at the other end, rendering it unreadable by interceptors or
eavesdroppers without secret knowledge,
Cipher or cypher

• Cipher is an algorithm to perform


encryption or decryption.

A scytale an early device used


for encryption.
MODERN
CRYTOGRAPHY
• The development of digital computers and electronics after WWII made
possible much more complex ciphers. Furthermore, computers allowed
for the encryption of any kind of data represent able in any binary format,
unlike classical ciphers which only encrypted written language texts: this
was new and significant. 

German Lorenz cipher machine- used


in WWII.
These days a fine example of cryptography is-
Credit card with smart card capabilities. The 3mm by 5mm  chip
embedded in card had the power to compute cryptographic
algorithm. 
Advantages of cryptography
• Confidentiality − Encryption technique can guard the information and
communication from unauthorized revelation and access of information.
• Authentication − The cryptographic techniques such as MAC and digital
signatures can protect information against spoofing and forgeries.
• Data Integrity − The cryptographic hash functions are playing vital role in
assuring the users about the data integrity.
• Non-repudiation − The digital signature provides the non-repudiation
service to guard against the dispute that may arise due to denial of
passing message by the sender.
APPLICATION OF CRYPTOGRAPHY

• ATM
• EMAIL
• QR CODE
• SECURE REMOTE ACCESS
• SMART CARD AND MANY MORE
WHAT IS STEGANOGRAPHY
• Steganography is the practice of hiding a secret message inside of (or
even on top of) something that is not secret. That something can be
just about anything you want. These days, many examples of
steganography involve embedding a secret piece of text inside of a
picture. Or hiding a secret message or script inside of a Word or Excel
document
Evolution of Steganography
• Codebreakers: The code breakers explain about the battle of codes
and ciphers.
• Invisible ink: A general letter may have a different message written in
between the lines with the invisible ink and the invisible ink may be
milk, vinegar, and fruit juice or urine.
• Microdots: The technology of microdots was developed by the
Germans and this applied science also works in the hiding of the
messages.
Types of Steganography
• Messages in the text: The messages in text program are also called as SPAM
MIMIC and the messages can be hidden in a form of text reframing the text
of the carrier file.
• Messages in still images: The messages in the still images are a very popular
tool in outguess.
• Messages in audio: The messages in the audio information in the layer III of
the encoding process of MP3 file and the messages in the audio are sent
along the noise.
• Messages in a video: The messages in the video integrating data into the
multimedia have got the attention very slowly. The video files are the best
carrier files as they have more irrelevant bits.
Application of Steganography
• Having confidential communication and storage of secret data.
• Giving protection to the data alteration
• Providing a control system for better distribution of digital content.
• It is hugely used in the media database systems

Steganographic image-Hiding an image inside another


Advantages of steganography

• The steganography is for protecting the data, such as in the field of


media where the copywriting ensures the authentication.
• The steganography can be used by the intelligence agencies for
transmitting their secret information.
Disadvantage of steganography

• By using the steganography mechanism many terrorist and have anti-


humanist activities have occurred.
THANK YOU....

You might also like