NAAC-Accredited 'A' - Grade 2(f) & 12(B) status (UGC) |ISO
9001:2015 Certified | FIST Funded (DST) SIRO(DSIR)

Resource Person: Ms.Deepa Thangaraju, Project Manager, Senior Service Manager, Sopra Streria India, Chennai

Audience: III Year / VI Sem AI&DS Students

Topics Covered: Symmetric key cryptography, Asymmetric key cryptography, Key Distribution, PGP, GPG and Key Management


Take Away in the Guest Lecture:

» Fundamentals of Cryptography
» Role of keys in Encryption and Decryption
» Types of keys like private and public keys
» Few applications which uses private key and public key
» Symmetric Key and Asymmetric Key Cryptography
» We use symmetric key encryption when we need to transfer large chunks of information and data. We use asymmetric key encryption when we need to transfer only very small amounts of data
» Examples: Pros and Cons
» Insight into key management
» Key generation
» Managing keypair
» Key distribution
» Key integrity
» Updating a key’s expiration time- A key’s expiration time is associated with the key’s self-signature.
» Exploration of advanced features in key management
» Discussion on security enhancements and privacy considerations
» PGP and GPG in Email
» Insights into security program used in encryption and decryption
» Discussion on authentication of email messages through digital signature and file encryption
» Had a clarity on handling of digital signature with different scenarios