SlideShare a Scribd company logo
1 of 11
Encryption Presented By: Aaina katyal
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is encryption necessary? ,[object Object],[object Object],[object Object]
Benefits of Data Encryption   ,[object Object],[object Object]
Process
How to encrypt a file   ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

More Related Content

What's hot

How encryption works
How encryption worksHow encryption works
How encryption works
s1200019
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project review
Amit Debnath
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
s1170087
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 

What's hot (19)

Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networks
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project review
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Password protected Document.
Password protected Document.Password protected Document.
Password protected Document.
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should care
 
Week13presen
Week13presenWeek13presen
Week13presen
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Week12
Week12Week12
Week12
 
Sp W12
Sp W12Sp W12
Sp W12
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 

Viewers also liked

Tarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanovaTarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanova
aquasportclubs
 
CMS (content management system)
CMS (content management system)CMS (content management system)
CMS (content management system)
aaina_katyal
 
The results of experts interview
The results of experts interviewThe results of experts interview
The results of experts interview
Judy Liu+
 
Report on printers
Report on printersReport on printers
Report on printers
aaina_katyal
 
Extreme programming
Extreme programmingExtreme programming
Extreme programming
aaina_katyal
 

Viewers also liked (19)

Tarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanovaTarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanova
 
設計研究方法-觀察法
設計研究方法-觀察法設計研究方法-觀察法
設計研究方法-觀察法
 
CIARD RING - Gamze Doğan
CIARD RING - Gamze DoğanCIARD RING - Gamze Doğan
CIARD RING - Gamze Doğan
 
How ‪Crowdsourcing‬ Disrupts The Interior Design
How ‪Crowdsourcing‬ Disrupts The Interior DesignHow ‪Crowdsourcing‬ Disrupts The Interior Design
How ‪Crowdsourcing‬ Disrupts The Interior Design
 
CMS (content management system)
CMS (content management system)CMS (content management system)
CMS (content management system)
 
The results of experts interview
The results of experts interviewThe results of experts interview
The results of experts interview
 
2014 Tokyo trip sharing
2014 Tokyo trip sharing2014 Tokyo trip sharing
2014 Tokyo trip sharing
 
Introduction
IntroductionIntroduction
Introduction
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
The Future Of Work
The Future Of Work The Future Of Work
The Future Of Work
 
Report on printers
Report on printersReport on printers
Report on printers
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Extreme programming
Extreme programmingExtreme programming
Extreme programming
 
Italy 海外自助遊學經驗分享 by Judy Liu
Italy 海外自助遊學經驗分享 by Judy LiuItaly 海外自助遊學經驗分享 by Judy Liu
Italy 海外自助遊學經驗分享 by Judy Liu
 
Chapter 4 chromatography_b_2010
Chapter 4 chromatography_b_2010Chapter 4 chromatography_b_2010
Chapter 4 chromatography_b_2010
 
Intel
IntelIntel
Intel
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Cuentos centroamericanos (seleccion)[1]
Cuentos centroamericanos (seleccion)[1]Cuentos centroamericanos (seleccion)[1]
Cuentos centroamericanos (seleccion)[1]
 

Similar to Encryption_ppt

Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
sabtolinux
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
101 Blockchains
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
Ancy Mariam Babu
 

Similar to Encryption_ppt (20)

Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Confidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptxConfidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptx
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Encryption_ppt