Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

KRIPTOGRAFI

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

CRYPTOGRAPHY

APPLICATIONS OF CRYPTOGRAPHY IN DAILY


LIFE
• PENGESAHAN/TANDATANGAN DIGITAL
• PENGESAHAN ADALAH PROSES MEMBUKTIKAN/MENGESAHKAN MAKLUMAT
TERTENTU (DOKUMEN ASAL,IDENTITY PENGIRIM

• SETEM MASA
• TEKNIK UNTUK MENGESAHKAN DOKUMEN ELEKTRONIK WUJUD

• WANG ELEKTRONIK
• WANG TUNAI DIGITAL (KAD DEBIT/CREDIT CARD)
HOW CRYPTOGRAPHY USED IN CYBER
SECURITY

Cryptography digunakan semasa komunikasi , pensanan akan


dihantar dalam bentuk encrypted message supaya penggodam
tidak dapat membacanya kecuali penerima message yang sah

ini juga diaplikasikan di bank, facebook, password, whatsapp dan


sebagainya bagi menjamin keselamatan pengguna daripada
penggodam
CRYTOGRAPHY USED IN CYBER
SECURITY
• PROTECTING DEVICES FROM UNAUTHORIZED ACCESS
• CYBERSECURITY EXPERTS USE CRYPTOGRAPHY TO DESIGN ALGORITHMS,
CIPHERS, AND OTHER SECURITY THAT CODIFY AND PROTECT COMPANY AND
CUSTOMER DATA
• 3 CRYPTOGRAPHY TECHNIQUES USED IN CYBERSECURITY WORLDWIDE:
I) 3DES (TRIPLE DATA ENCRYPTION STANDARD)
FROM 56-BIT KEYS TO 168-BIT KEY  MORE SECURE
II) TWOFISH
TRANSFORM PLAIN TEXT INTO CIPHER TEXT
III) AES (ADVANCE ENCRYPTION METHOD)
USE SYMMETRIC KEY ENCRYPTION.
KEY NEEDS TO BE SHARED WITH OTHER PARTIES TO ENABLE THEM TO
ACCESS THE DATA WHICH HAS BEEN ENCRYPTED.
HOW CRYPTOGRAPHY PLAY ITS ROLE IN
COMMUNICATION
Cryptography, then, not only protects data from theft or alteration, but can also be used for
user authentication.
There are some specific security requirements, including:
- Authentication: the process of proving one's identity. (The primary forms of host-to-host
authentication an the internet today are name-based or address-based, both of which are
notoriously weak.)
- Privacy/confidentiality: ensuring that no one can read the message except the
intended receiver.
- Integrity: assuring the receiver that the received message has not been altered in any
way from the original.
- Non-repudiation: a mechanism to prove that the sender really sent this message.
HOW CRYTOGRAPHY PLAY ITS ROLE IN
COMMUNICATION?
• CRYPTOGRAPHIC USE AN ALGORITHM, A TECHNIQUE THAT
WOULD TRANSFORM HIS MESSAGE INTO AN ENCRYPTED FORM
• UNREADABLE EXCEPT BY THOSE FOR WHOM IT IS INTENDED
(HAVE KEY).
• WHEN ENCRYPTED, THE MESSAGE CAN ONLY BE INTERPRETED
THROUGH THE USE OF THE CORRESPONDING SECRET KEY.
• WITHOUT THE KEY THE MESSAGE IS USELESS.
• KEEP ALL THE MESSAGES AND INFORMATION SECRET.

You might also like