Computer Introduction-Lecture05

Dr. Mazin Mohamed alkathiri
Dr. Mazin Mohamed alkathiriHead of Information Technology Department
Lecture No. 5: Data Encryption
Lecturer: Dr. Mazin Alkathiri
Department of Information Tecnology,
College of Applied Science,
Seiyun University
2023
 Encryption is a security method in which information is encoded in such a
way that only authorized user can read it.
 It uses encryption algorithm to generate ciphertext that can only be read if
decrypted.
plaintext
encryption
ciphertext
decryption
plaintext
• Plaintext: a message in its original form
• Ciphertext: a message in the transformed, unrecognized form
• Encryption: the process for producing ciphertext from plaintext
• Decryption: the reverse of encryption
• Key: a secret value used to control encryption/decryption
 There are two types of encryptions schemes as listed below:
 Symmetric Key encryption
 Public Key encryption
 Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption
of cipher text.
plaintext
encryption
ciphertext
decryption
plaintext
key key
same key
 Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is
public. These two keys are mathematically linked with each other.
plaintext
encryption
ciphertext
decryption
plaintext
public key private key
In terms of security, hashing is a technique used to encrypt data and
generate unpredictable hash values. It is the hash function that
generates the hash code, which helps to protect the security of
transmission from unauthorized users.
 provides a way to verify that the message received is the same as
the message sent. It can take a plain text message as input and
then computes a value based on that message.
• Key Points
• The length of computed value is much shorter than the original message.
• It is possible that different plain text messages could generate the same value.
 is an electronic, encrypted, stamp of authentication on digital information such
as email messages, or electronic documents. A signature confirms that the
information originated from the signer and has not been altered.
 Signing certificate To create a digital signature, you need a signing certificate,
which proves identity.
◦ When you send a digitally-signed macro or document, you also send your certificate and
public key.
◦ Certificates are issued by a certification authority, and like a driver’s license, can be
revoked.
◦ A certificate is usually valid for a year, after which, the signer must renew, or get a new,
signing certificate to establish identity.
Computer Introduction-Lecture05
 There are several reasons to implement digital signatures to
communications:
 Authentication: Digital signatures help to authenticate the
sources of messages.
 Integrity: Once the message is signed, any change in the message
would invalidate the signature.
 Non-repudiation: By this property, any entity that has signed some
information cannot at a later time deny having signed it.
 is a barrier between Local Area Network (LAN) and the Internet. It
allows keeping private resources confidential and minimizes the
security risks. It controls network traffic, in both directions.
 The following diagram depicts a sample firewall between LAN and
the internet. The connection between the two is the point of
vulnerability. Both hardware and the software can be used at this
point to filter network traffic.
Computer Introduction-Lecture05
• Firewall management must be addressed by both system managers
and the network managers.
• The amount of filtering a firewall varies. For the same firewall, in
different directions.
1 of 14

Recommended

Iaetsd a survey on cloud storage security with by
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
346 views5 slides
Running Head CRYPTOGRAPHYCRYPTOGRAPHY2CRYPTOGRAPH.docx by
Running Head CRYPTOGRAPHYCRYPTOGRAPHY2CRYPTOGRAPH.docxRunning Head CRYPTOGRAPHYCRYPTOGRAPHY2CRYPTOGRAPH.docx
Running Head CRYPTOGRAPHYCRYPTOGRAPHY2CRYPTOGRAPH.docxtodd271
4 views8 slides
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx by
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docxblondellchancy
2 views25 slides
Demonstration of secure socket layer(synopsis) by
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
533 views17 slides
Ppt by
PptPpt
PptNidhi Bansal
67 views25 slides
Mutual Authentication For Wireless Communication by
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
2.4K views25 slides

More Related Content

Similar to Computer Introduction-Lecture05

Performance Comparison of File Security System using TEA and Blowfish Algorithms by
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
62 views7 slides
cryptography by
cryptographycryptography
cryptographyswatihans
23 views19 slides
A+ Update Endpoint Encryption by
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
1.3K views34 slides
Grid security seminar mohit modi by
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
291 views9 slides
Digital signature by
Digital  signatureDigital  signature
Digital signatureAJAL A J
21.7K views20 slides
Encryption by fastech by
Encryption by fastechEncryption by fastech
Encryption by fastechAbdulafeez Fasasi
419 views25 slides

Similar to Computer Introduction-Lecture05(20)

Performance Comparison of File Security System using TEA and Blowfish Algorithms by ijtsrd
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd62 views
cryptography by swatihans
cryptographycryptography
cryptography
swatihans23 views
A+ Update Endpoint Encryption by OSU - East
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
OSU - East1.3K views
Grid security seminar mohit modi by Mohit Modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
Mohit Modi291 views
Digital signature by AJAL A J
Digital  signatureDigital  signature
Digital signature
AJAL A J21.7K views
PRESENTATION ON CRYPTOGRAPHY.pptx by RiddhiGupta84
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
RiddhiGupta8480 views
Jiit;project 2013-2014;cse;project presentation by Chakshu Sharma
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentation
Chakshu Sharma325 views
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi... by Editor IJMTER
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER184 views
Cryptointro by losalamos
CryptointroCryptointro
Cryptointro
losalamos536 views
International Journal of Engineering Research and Development (IJERD) by IJERD Editor
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor249 views
A Study For Public Key Digital Signature Schemes by Melissa Long
A Study For Public Key Digital Signature SchemesA Study For Public Key Digital Signature Schemes
A Study For Public Key Digital Signature Schemes
Melissa Long2 views
Data security for any organization by using public key infrastructure compone... by eSAT Journals
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
eSAT Journals135 views
Data security for any organization by using public key infrastructure compone... by eSAT Publishing House
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...

More from Dr. Mazin Mohamed alkathiri

Mobile Application Development class 008 by
Mobile Application Development class 008Mobile Application Development class 008
Mobile Application Development class 008Dr. Mazin Mohamed alkathiri
17 views16 slides
Academic Writing (Punctuation ) class 06 by
Academic Writing (Punctuation ) class 06Academic Writing (Punctuation ) class 06
Academic Writing (Punctuation ) class 06Dr. Mazin Mohamed alkathiri
13 views18 slides
Academic Writing (Technical report writing ) class 07 by
Academic Writing (Technical report writing ) class 07Academic Writing (Technical report writing ) class 07
Academic Writing (Technical report writing ) class 07Dr. Mazin Mohamed alkathiri
17 views13 slides
Computer Introduction-Lecture07 by
Computer Introduction-Lecture07Computer Introduction-Lecture07
Computer Introduction-Lecture07Dr. Mazin Mohamed alkathiri
8 views11 slides
Computer Introduction-Lecture06 by
Computer Introduction-Lecture06Computer Introduction-Lecture06
Computer Introduction-Lecture06Dr. Mazin Mohamed alkathiri
124 views12 slides
Mobile Application Development class 007 by
Mobile Application Development class 007Mobile Application Development class 007
Mobile Application Development class 007Dr. Mazin Mohamed alkathiri
47 views19 slides

More from Dr. Mazin Mohamed alkathiri(20)

Recently uploaded

Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice by
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceTaste
45 views50 slides
Education of marginalized and socially disadvantages segments.pptx by
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptxGarimaBhati5
43 views36 slides
unidad 3.pdf by
unidad 3.pdfunidad 3.pdf
unidad 3.pdfMarcosRodriguezUcedo
134 views38 slides
Class 9 lesson plans by
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plansTARIQ KHAN
82 views34 slides
Meet the Bible by
Meet the BibleMeet the Bible
Meet the BibleSteve Thomason
78 views80 slides
Pharmaceutical Analysis PPT (BP 102T) by
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T) yakshpharmacy009
108 views29 slides

Recently uploaded(20)

Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice by Taste
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a ChoiceCreative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Creative Restart 2023: Atila Martins - Craft: A Necessity, Not a Choice
Taste45 views
Education of marginalized and socially disadvantages segments.pptx by GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati543 views
Class 9 lesson plans by TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN82 views
Pharmaceutical Analysis PPT (BP 102T) by yakshpharmacy009
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T)
yakshpharmacy009108 views
Retail Store Scavenger Hunt.pptx by jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15452 views
11.30.23A Poverty and Inequality in America.pptx by mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239130 views
Six Sigma Concept by Sahil Srivastava.pptx by Sahil Srivastava
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptx
Sahil Srivastava44 views
Narration lesson plan by TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN75 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
The Future of Micro-credentials: Is Small Really Beautiful? by Mark Brown
The Future of Micro-credentials:  Is Small Really Beautiful?The Future of Micro-credentials:  Is Small Really Beautiful?
The Future of Micro-credentials: Is Small Really Beautiful?
Mark Brown75 views
Parts of Speech (1).pptx by mhkpreet001
Parts of Speech (1).pptxParts of Speech (1).pptx
Parts of Speech (1).pptx
mhkpreet00146 views

Computer Introduction-Lecture05

  • 1. Lecture No. 5: Data Encryption Lecturer: Dr. Mazin Alkathiri Department of Information Tecnology, College of Applied Science, Seiyun University 2023
  • 2.  Encryption is a security method in which information is encoded in such a way that only authorized user can read it.  It uses encryption algorithm to generate ciphertext that can only be read if decrypted.
  • 3. plaintext encryption ciphertext decryption plaintext • Plaintext: a message in its original form • Ciphertext: a message in the transformed, unrecognized form • Encryption: the process for producing ciphertext from plaintext • Decryption: the reverse of encryption • Key: a secret value used to control encryption/decryption
  • 4.  There are two types of encryptions schemes as listed below:  Symmetric Key encryption  Public Key encryption
  • 5.  Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption of cipher text. plaintext encryption ciphertext decryption plaintext key key same key
  • 6.  Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is public. These two keys are mathematically linked with each other. plaintext encryption ciphertext decryption plaintext public key private key
  • 7. In terms of security, hashing is a technique used to encrypt data and generate unpredictable hash values. It is the hash function that generates the hash code, which helps to protect the security of transmission from unauthorized users.
  • 8.  provides a way to verify that the message received is the same as the message sent. It can take a plain text message as input and then computes a value based on that message. • Key Points • The length of computed value is much shorter than the original message. • It is possible that different plain text messages could generate the same value.
  • 9.  is an electronic, encrypted, stamp of authentication on digital information such as email messages, or electronic documents. A signature confirms that the information originated from the signer and has not been altered.  Signing certificate To create a digital signature, you need a signing certificate, which proves identity. ◦ When you send a digitally-signed macro or document, you also send your certificate and public key. ◦ Certificates are issued by a certification authority, and like a driver’s license, can be revoked. ◦ A certificate is usually valid for a year, after which, the signer must renew, or get a new, signing certificate to establish identity.
  • 11.  There are several reasons to implement digital signatures to communications:  Authentication: Digital signatures help to authenticate the sources of messages.  Integrity: Once the message is signed, any change in the message would invalidate the signature.  Non-repudiation: By this property, any entity that has signed some information cannot at a later time deny having signed it.
  • 12.  is a barrier between Local Area Network (LAN) and the Internet. It allows keeping private resources confidential and minimizes the security risks. It controls network traffic, in both directions.  The following diagram depicts a sample firewall between LAN and the internet. The connection between the two is the point of vulnerability. Both hardware and the software can be used at this point to filter network traffic.
  • 14. • Firewall management must be addressed by both system managers and the network managers. • The amount of filtering a firewall varies. For the same firewall, in different directions.