SlideShare a Scribd company logo
Data encryption SMS Hasan (Sharqi) (BSc)
Computer Science Teacher - Cambridge Section
Yara International School, Riyadh - KSA
hasan.edu21@gmail.com
+966 57 087 58 28
24-NOV-2021
Data encryption
• Internet is world wide network
• We exchange a lot of private data on the internet.
– Email credentials
– Credit card numbers
– Private messages
– Passwords
• It is important to keep the data safe from
eavesdroppers during data transmission.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 2
Keywords
Encryption: is a
method of
protecting data
during the data
transmission.
Eavesdroppers:
The people who
intercept and
read our data
during the data
transmission such
as hackers.
What is called data
encryption?
• Data encryption is a process of scrambling data
(message) into human unreadable format before
the transmission takes place.
• This is sometimes called cryptography.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 3
Keywords
Scrambling:
mixing up and
making confusing.
Cryptography: is
the study of
secure
communications
techniques that
allow only the
sender and
intended
recipient of a
message to view
its contents.
Data encryption
simulation
Activity:
• Use the simulation tool available in the below
link to find how encryption works really.
https://www.online-toolz.com/tools/text-
encryption-decryption.php
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 4
Keywords
Simulation: is a
way of seeing a
thing happen
without it actually
taking place in
the same way.
Data encryption…
• Before the encryption takes place, the data is called
plain-text.
• Then, an encryption algorithm (encryption key) is
applied to the data to scramble and make it
meaningless, this data will be called ciphertext.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 5
Keywords
Plain-text: the
name given to
data before the
encryption
Cipher-text: the
name given to
data after the
encryption
Algorithm: step
by step procedure
to solve a
problem.
plaintext
encryption key
ciphertext
Data encryption…
• Now, the ciphertext will be transmitted from
sender to receiver.
• In the end, once the receiver, received the data,
will decrypt the data from ciphertext to plain
text using the decryption key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 6
Keywords
Sender: the
device which
sends the data
from.
Receiver: the
device which
receives the data
from the sender.
Decryption: the
process of
converting the
data from
ciphertext to
plaintext.
Data encryption simulation
Activity:
• Use the simulation tool available in the below
link to find how encryption works really.
https://codebeautify.org/encrypt-decrypt
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 7
Keywords
Simulation: is a
way of seeing a
thing happen
without it actually
taking place in
the same way.
Question in context
• Does encryption stop data being stolen by a
hacker?
– No, It will not stop a hacker from stealing the
data, but the data will be unreadable.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 8
Types of data encryption
1. Symmetric data encryption.
2. Asymmetric data encryption
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 9
Types of data encryption –
1. Symmetric data encryption
1. Symmetric data encryption.
– Uses an encryption key: the same key used to
encrypt and decrypt the data.
Example: 10 digit encryption key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 10
plaintext
encryption key
ciphertext
Data encryption simulation –
Symmetric encryption
Activity:
• Use the simulation tool available in the below
link to find how symmetric encryption works
really.
https://codebeautify.org/encrypt-decrypt
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 11
Symmetric data encryption -
Question in context
• Is this enough to keep the data safe?
– No, because in a symmetric encryption, a
single key is shared between sender and the
receiver.
– It is a matter of seconds for the modern
computers to decode an encrypted message
using a single key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 12
Keywords
Decode:
Metaphor of the
decryption.
2. Asymmetric data encryption.
– Uses different keys for encrypting and
decrypting the data.
• Public key = (Available for everyone)
• Private key = (Only available for the receiver’s
computer)
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 13
Keywords
Public key: a key
which is made
available by the
receiver to the
sender to send
the data.
Private key: a key
which is available
in the receiver’s
computer only to
decrypt the data
that arrived from
the sender.
Step 01 Step 02
Types of data encryption –
2. Asymmetric data encryption
Data encryption simulation –
Asymmetric encryption
Activity:
• Use the simulation tool available in the below
link to find how asymmetric encryption works
really.
https://www.javainuse.com/rsagenerator
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 14
Asymmetric data encryption -
Question in context
• Is this enough to keep the data safe?
– This method is more than enough to keep the data
safe because the private key will be available only on
the receiver's computer which is used to decrypt the
message.
– The senders will send the message to the receivers
using public key only, no one knows the receiver’s
private key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 15
Q & A
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 16
Thank you
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 17

More Related Content

Similar to Data encryption.pptx

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas
 

Similar to Data encryption.pptx (20)

A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
04 authentication
04 authentication04 authentication
04 authentication
 
Security
SecuritySecurity
Security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
s117
s117s117
s117
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Data encryption.pptx

  • 1. Data encryption SMS Hasan (Sharqi) (BSc) Computer Science Teacher - Cambridge Section Yara International School, Riyadh - KSA hasan.edu21@gmail.com +966 57 087 58 28 24-NOV-2021
  • 2. Data encryption • Internet is world wide network • We exchange a lot of private data on the internet. – Email credentials – Credit card numbers – Private messages – Passwords • It is important to keep the data safe from eavesdroppers during data transmission. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 2 Keywords Encryption: is a method of protecting data during the data transmission. Eavesdroppers: The people who intercept and read our data during the data transmission such as hackers.
  • 3. What is called data encryption? • Data encryption is a process of scrambling data (message) into human unreadable format before the transmission takes place. • This is sometimes called cryptography. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 3 Keywords Scrambling: mixing up and making confusing. Cryptography: is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
  • 4. Data encryption simulation Activity: • Use the simulation tool available in the below link to find how encryption works really. https://www.online-toolz.com/tools/text- encryption-decryption.php 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 4 Keywords Simulation: is a way of seeing a thing happen without it actually taking place in the same way.
  • 5. Data encryption… • Before the encryption takes place, the data is called plain-text. • Then, an encryption algorithm (encryption key) is applied to the data to scramble and make it meaningless, this data will be called ciphertext. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 5 Keywords Plain-text: the name given to data before the encryption Cipher-text: the name given to data after the encryption Algorithm: step by step procedure to solve a problem. plaintext encryption key ciphertext
  • 6. Data encryption… • Now, the ciphertext will be transmitted from sender to receiver. • In the end, once the receiver, received the data, will decrypt the data from ciphertext to plain text using the decryption key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 6 Keywords Sender: the device which sends the data from. Receiver: the device which receives the data from the sender. Decryption: the process of converting the data from ciphertext to plaintext.
  • 7. Data encryption simulation Activity: • Use the simulation tool available in the below link to find how encryption works really. https://codebeautify.org/encrypt-decrypt 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 7 Keywords Simulation: is a way of seeing a thing happen without it actually taking place in the same way.
  • 8. Question in context • Does encryption stop data being stolen by a hacker? – No, It will not stop a hacker from stealing the data, but the data will be unreadable. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 8
  • 9. Types of data encryption 1. Symmetric data encryption. 2. Asymmetric data encryption 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 9
  • 10. Types of data encryption – 1. Symmetric data encryption 1. Symmetric data encryption. – Uses an encryption key: the same key used to encrypt and decrypt the data. Example: 10 digit encryption key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 10 plaintext encryption key ciphertext
  • 11. Data encryption simulation – Symmetric encryption Activity: • Use the simulation tool available in the below link to find how symmetric encryption works really. https://codebeautify.org/encrypt-decrypt 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 11
  • 12. Symmetric data encryption - Question in context • Is this enough to keep the data safe? – No, because in a symmetric encryption, a single key is shared between sender and the receiver. – It is a matter of seconds for the modern computers to decode an encrypted message using a single key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 12 Keywords Decode: Metaphor of the decryption.
  • 13. 2. Asymmetric data encryption. – Uses different keys for encrypting and decrypting the data. • Public key = (Available for everyone) • Private key = (Only available for the receiver’s computer) 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 13 Keywords Public key: a key which is made available by the receiver to the sender to send the data. Private key: a key which is available in the receiver’s computer only to decrypt the data that arrived from the sender. Step 01 Step 02 Types of data encryption – 2. Asymmetric data encryption
  • 14. Data encryption simulation – Asymmetric encryption Activity: • Use the simulation tool available in the below link to find how asymmetric encryption works really. https://www.javainuse.com/rsagenerator 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 14
  • 15. Asymmetric data encryption - Question in context • Is this enough to keep the data safe? – This method is more than enough to keep the data safe because the private key will be available only on the receiver's computer which is used to decrypt the message. – The senders will send the message to the receivers using public key only, no one knows the receiver’s private key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 15
  • 16. Q & A 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 16
  • 17. Thank you 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 17