Documente Academic
Documente Profesional
Documente Cultură
Stemina SC
17TUCS236
III CSE-C
INTRODUCTION TO CRYPTOGRAPHY
Cryptography is associated with the process of converting ordinary plain text
into unintelligible text and vice-versa. It is a method of storing and transmitting
data in a particular form so that only those for whom it is intended can read and
process it. Cryptography not only protects data from theft or alteration, but can
also be used for user authentication. These deterministic algorithms are used
for cryptographic key generation and digital signing and verification to protect
data privacy, web browsing on the internet and confidential communications
such as credit card transactions and email.
TYPES OF CRYPTOGRAPHY
Symmetric-key Cryptography
Public-Key Cryptography
Hash Functions
Symmetric-key Cryptography
Both the sender and receiver share a single key. The sender uses this key to
encrypt plaintext and send the cipher text to the receiver. On the other side the
receiver applies the same key to decrypt the message and recover the plain
text.
Public-Key Cryptography
This is the most revolutionary concept in the last 300-400 years. In Public-
Key Cryptography two related keys (public and private key) are used. Public
key may be freely distributed, while its paired private key, remains a secret.
The public key is used for encryption and for decryption private key is used.
Hash Functions
ENCRYPTION IN ATM
The introduction of the ATM also known as Automatic Teller Machine
proved to be an important technological development that enabled financial
institutions to provide services to their customers in a 24X7 environment. The
ATM has enhanced the convenience of customers by enabling them to access
their cash wherever required from the nearest ATM. The basic concept is that
a person with a valid card can conduct any banking transaction without
visiting a branch. They are well known for its convenience to the customers,
cost effectiveness to the bank and most importantly it is an extremely secure
banking method. The functions of ATMs depend on authorization of a
transaction by the bank via a secure communications network.
CONCLUSION
In the future, the need for data security and integrity will continue to require
our careful thought and consideration. For carrying out critical transactions
like fund transfers, the banks, at the least, need to implement robust and
dynamic two-factor authentication through user id/password combination and
second factor like a digital signature or OTP/dynamic access code through
various modes (like SMS over mobile phones or hardware token).