"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Encryption.ppt
1.
2. Disclaimer: This presentation is prepared by trainees of
baabtra as a part of mentoring program. This is not official
document of baabtra –Mentoring Partner
Baabtra-Mentoring Partner is the mentoring division of baabte System Technologies Pvt . Ltd
4. CONTENTS
• What is encryption?
• why is it important?
• Why use encryption?
• Examples of Encryption
• How it works??
5. Encryption
• Encryption is the most effective way to
achieve data security
• Encryption is the process of converting data to
an unrecognizable or "encrypted" form.
• Encryption is also used to secure data sent
over wireless networks and the Internet
6. why is it important?
• Encryption is important because it allows you
to securely protect data that you don't want
anyone else to have access to.
7. Why use encryption?
• Authentication
• Protects personal data such as passwords.
Privacy
• Provides for confidentiality of private
information.
• Integrity
• Ensures that a document or file has not
been altered.
9. How it works??
• Start with a message that has to be sent
securely. This could be
Text.
Numeric Data.
Secret Codes
Next we need an encryption key. This could be a phrase
like ‘My secret password phrase
The computer receiving the message knows the digital key
and so is able to work out the original message.
10. Encryption methods
• Hashing Encryption
Since a hash is unique to a specific message,
even minor changes to that message result in
a dramatically different hash, thereby alerting
a user to potential tampering. Some common
hashing algorithms are Message Digest 5
(MD5) and Secure Hashing Algorithm (SHA).
11. • Symmetric Methods
– also called private-key cryptography, is one of the
oldest and most secure encryption methods
– A sender encodes a message into ciphertext using
a Private key, and the receiver uses the same key
to decode it
12. • Asymmetric Forms
Asymmetric, or public key, cryptography is,
potentially, more secure than symmetric methods
of encryption.
Uses two keys, a "private" key and a "public key,"
to perform encryption and decryption
14. Want to learn more about programming or Looking to become a good programmer?
Are you wasting time on searching so many contents online?
Do you want to learn things quickly?
Tired of spending huge amount of money to become a Software professional?
Do an online course
@ baabtra.com
We put industry standards to practice. Our structured, activity based courses are so designed
to make a quick, good software professional out of anybody who holds a passion for coding.
15. Follow us @ twitter.com/baabtra
Like us @ facebook.com/baabtra
Subscribe to us @ youtube.com/baabtra
Become a follower @ slideshare.net/BaabtraMentoringPartner
Connect to us @ in.linkedin.com/in/baabtra
Give a feedback @ massbaab.com/baabtra
Thanks in advance
www.baabtra.com | www.massbaab.com |www.baabte.com
16. Emarald Mall (Big Bazar Building)
Mavoor Road, Kozhikode,
Kerala, India.
Ph: + 91 – 495 40 25 550
NC Complex, Near Bus Stand
Mukkam, Kozhikode,
Kerala, India.
Ph: + 91 – 495 40 25 550
Cafit Square,
Hilite Business Park,
Near Pantheerankavu,
Kozhikode
Start up Village
Eranakulam,
Kerala, India.
Email: info@baabtra.com
Contact Us