Encryption

3,875
-1

Published on

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,875
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
357
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • Cryptography is the science of writing messages in secret codes . It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone Although we tend to use the words ‘code’ and ‘cipher’ interchangeably, technically they're two entirely different things. When you substitute each letter in a message for a different symbol that's a cipher. A code on the other hand means assigning a secret meaning to a word or phrase.
  • In its earliest form, people have been attempting to conceal certain information that they wanted to keep to their own possession by substituting parts of the information with symbols, numbers and pictures.Ancient Babylonian merchants used intaglio, a piece of flat stone carved into a collage of images and some writing to identify themselves in trading transactions. Using this mechanism, they are producing what today we know as 'digital signature.' The public knew that a particular 'signature' belonged to this trader, but only he had the intaglio to produce that signature.
  • encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
  • Basic types of encryption may be considered asMANUAL ENCRYPTION:Manual encryption is a type that involves the use of encryption software. These are computer programs that encrypt various bits of information digitally. Manual encryption involves the user's participation completely. The files he wants to encrypt are chosen, and then an encryption type is chosen from a list that the security system provides. This is great for personal computers because it allows a user to encrypt personal files in a way that will suit him, thus protecting personal material on a computer. Transparent EncryptionTransparent encryption is another type of computer software encryption. It can be downloaded onto a computer to encrypt everything automatically. This is one of the most secure types of encryption available because it doesn't leave out anything that might be forgotten when using manual encryption. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen.
  • Symmetric EncryptionNot all encryption is done via a computer software program. You can easily encrypt information by yourself. One of the simplest ways to do this is through symmetric encryption. Here, a letter or number coincides with another letter or number in the encryption code. You can make the code up yourself--for example, a=1, b=2 and so on. You can take any written text and substitute letters and numbers for their coded counterpart, thus encrypting the text. Asymmetric EncryptionAsymmetric encryption is a secure and easy way that can be used to encrypt data that you will be receiving. It is generally done electronically. A public key is given out to whomever you want or posted somewhere for the public to see. They can then encrypt information using the key and send it to you. This is often done when writing emails. However, to decipher the encrypted code, there is another key, a private one, that only one person has. This means that while any can encrypt the data with the public key, it can only be read again by whomever has the private key.
  • Encryption

    1. 1. ENCRYPTION Mrs. Vasanthi Muniasamy 1
    2. 2. SEQUENCE INTRODUCTION HISTORY ENCRYPTION TYPES OF ENCRYPTION METHODS OF ENCRYPTION USES CONCLUSION 2
    3. 3. INTRODUCTION CRYPTOGRAPHY: Science of encryption and decryption; converting between plaintext and ciphertext ENCRYPTION: Conversion of data into a form, called a ciphertext DECRYPTION To make encrypted information readable again 3
    4. 4. HISTORY Ancient Babylonian merchants used intaglio A piece of flat stone carved into images and writings Using this, they are producing what we today call ‘Digital Signature’ 4
    5. 5. ENCRYPTION Process of transforming information Using cipher (algorithm) Unreadable to everyone except the one having key 5
    6. 6. 6
    7. 7. TYPES OF ENCRYPTION 1. MANUAL ENCRYPTION: Use of encryption software User’s participation Great for PCs 2. TRANSPARENT ENCRYPTION: Most secure type of encryption Encrypts everything on computer 7
    8. 8. TYPES OF ENCRYPTION…(cont’d) 3. SYMMETRIC ENCRYPTION: Most simplest type Code up yourself Only one key needed Safe method needed for transmission of key 8
    9. 9. TYPES OF ENCRYPTION…(cont’d) 9
    10. 10. TYPES OF ENCRYPTION…(cont’d) 4. ASYMMETRIC ENCRYPTION: Done electronically Public key is posted for the public to encrypt Decrpytion done only by private key 10
    11. 11. TYPES OF ENCRYPTION…(cont’d) 11
    12. 12. METHODS OF ENCRYPTION Consists of two main categories Stream Encryption: Clear text encrypted character by character Block Cipher Encryption: Clear text encrypted block by block 12
    13. 13. USES OF ENCRYPTION Protect information on your computer. Protect information in transit Wireless phones 13
    14. 14. USES OF ENCRYPTION … (cont’d) Confidentiality of medical, personal and transaction records Email program Digital signature 14
    15. 15. CONCLUSION Contrary to what most people think, encryption is not a new thing Encryption is being commonly used to facilitate secret communication Encryption is used to protect data at rest and at transit 15
    16. 16. 16 THANK YOU!
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×