Encryption

1,215 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,215
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
63
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Cryptography is the science of writing messages in secret codes . It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone Although we tend to use the words ‘code’ and ‘cipher’ interchangeably, technically they're two entirely different things. When you substitute each letter in a message for a different symbol that's a cipher. A code on the other hand means assigning a secret meaning to a word or phrase.
  • In its earliest form, people have been attempting to conceal certain information that they wanted to keep to their own possession by substituting parts of the information with symbols, numbers and pictures.Ancient Babylonian merchants used intaglio, a piece of flat stone carved into a collage of images and some writing to identify themselves in trading transactions. Using this mechanism, they are producing what today we know as 'digital signature.' The public knew that a particular 'signature' belonged to this trader, but only he had the intaglio to produce that signature.
  • encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
  • Basic types of encryption may be considered asMANUAL ENCRYPTION:Manual encryption is a type that involves the use of encryption software. These are computer programs that encrypt various bits of information digitally. Manual encryption involves the user's participation completely. The files he wants to encrypt are chosen, and then an encryption type is chosen from a list that the security system provides. This is great for personal computers because it allows a user to encrypt personal files in a way that will suit him, thus protecting personal material on a computer. Transparent EncryptionTransparent encryption is another type of computer software encryption. It can be downloaded onto a computer to encrypt everything automatically. This is one of the most secure types of encryption available because it doesn't leave out anything that might be forgotten when using manual encryption. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen.
  • Symmetric EncryptionNot all encryption is done via a computer software program. You can easily encrypt information by yourself. One of the simplest ways to do this is through symmetric encryption. Here, a letter or number coincides with another letter or number in the encryption code. You can make the code up yourself--for example, a=1, b=2 and so on. You can take any written text and substitute letters and numbers for their coded counterpart, thus encrypting the text. Asymmetric EncryptionAsymmetric encryption is a secure and easy way that can be used to encrypt data that you will be receiving. It is generally done electronically. A public key is given out to whomever you want or posted somewhere for the public to see. They can then encrypt information using the key and send it to you. This is often done when writing emails. However, to decipher the encrypted code, there is another key, a private one, that only one person has. This means that while any can encrypt the data with the public key, it can only be read again by whomever has the private key.
  • Encryption

    1. 1. 1
    2. 2. ENCRYPTIONPRESENTED BYPLT. OFF. FIZA NADEEM2
    3. 3. SEQUENCEINTRODUCTIONHISTORYENCRYPTIONTYPES OF ENCRYPTIONMETHODS OF ENCRYPTIONUSESCONCLUSION3
    4. 4. INTRODUCTIONCRYPTOGRAPHY:Science of encryption and decryption; convertingbetween plaintext and ciphertextENCRYPTION:Conversion of data into a form, called a ciphertextDECRYPTIONTo make encrypted information readable again4
    5. 5. HISTORYAncient Babylonian merchants used intaglioA piece of flat stone carved into images andwritingsUsing this, they are producing what we todaycall ‘Digital Signature’5
    6. 6. ENCRYPTIONProcess of transforming informationUsing cipher (algorithm)Unreadable to everyone except the one havingkey6
    7. 7. 7
    8. 8. TYPES OF ENCRYPTION1. MANUAL ENCRYPTION:Use of encryption softwareUser’s participationGreat for PCs2. TRANSPARENT ENCRYPTION:Most secure type of encryptionEncrypts everything on computer8
    9. 9. TYPES OF ENCRYPTION…(cont’d)3. SYMMETRIC ENCRYPTION:Most simplest typeCode up yourselfOnly one key neededSafe method needed for transmission of key9
    10. 10. TYPES OF ENCRYPTION…(cont’d)10
    11. 11. TYPES OF ENCRYPTION…(cont’d)4. ASYMMETRIC ENCRYPTION:Done electronicallyPublic key is posted for the public to encryptDecrpytion done only by private key11
    12. 12. TYPES OF ENCRYPTION…(cont’d)12
    13. 13. METHODS OF ENCRYPTIONConsists of two main categoriesStream Encryption: Clear text encryptedcharacter by characterBlock Cipher Encryption: Clear text encryptedblock by block13
    14. 14. USES OF ENCRYPTIONProtect information on your computer.Protect information in transitWireless phones14
    15. 15. USES OF ENCRYPTION … (cont’d)Confidentiality of medical, personal andtransaction recordsEmail programDigital signature15
    16. 16. CONCLUSIONContrary to what most people think, encryptionis not a new thingEncryption is being commonly used to facilitatesecret communicationEncryption is used to protect data at rest and attransit16
    17. 17. THANK YOU!17
    18. 18. Q & A18

    ×