SlideShare a Scribd company logo
1 of 17
Data encryption SMS Hasan (Sharqi) (BSc)
Computer Science Teacher - Cambridge Section
Yara International School, Riyadh - KSA
hasan.edu21@gmail.com
+966 57 087 58 28
24-NOV-2021
Data encryption
• Internet is world wide network
• We exchange a lot of private data on the internet.
– Email credentials
– Credit card numbers
– Private messages
– Passwords
• It is important to keep the data safe from
eavesdroppers during data transmission.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 2
Keywords
Encryption: is a
method of
protecting data
during the data
transmission.
Eavesdroppers:
The people who
intercept and
read our data
during the data
transmission such
as hackers.
What is called data
encryption?
• Data encryption is a process of scrambling data
(message) into human unreadable format before
the transmission takes place.
• This is sometimes called cryptography.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 3
Keywords
Scrambling:
mixing up and
making confusing.
Cryptography: is
the study of
secure
communications
techniques that
allow only the
sender and
intended
recipient of a
message to view
its contents.
Data encryption
simulation
Activity:
• Use the simulation tool available in the below
link to find how encryption works really.
https://www.online-toolz.com/tools/text-
encryption-decryption.php
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 4
Keywords
Simulation: is a
way of seeing a
thing happen
without it actually
taking place in
the same way.
Data encryption…
• Before the encryption takes place, the data is called
plain-text.
• Then, an encryption algorithm (encryption key) is
applied to the data to scramble and make it
meaningless, this data will be called ciphertext.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 5
Keywords
Plain-text: the
name given to
data before the
encryption
Cipher-text: the
name given to
data after the
encryption
Algorithm: step
by step procedure
to solve a
problem.
plaintext
encryption key
ciphertext
Data encryption…
• Now, the ciphertext will be transmitted from
sender to receiver.
• In the end, once the receiver, received the data,
will decrypt the data from ciphertext to plain
text using the decryption key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 6
Keywords
Sender: the
device which
sends the data
from.
Receiver: the
device which
receives the data
from the sender.
Decryption: the
process of
converting the
data from
ciphertext to
plaintext.
Data encryption simulation
Activity:
• Use the simulation tool available in the below
link to find how encryption works really.
https://codebeautify.org/encrypt-decrypt
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 7
Keywords
Simulation: is a
way of seeing a
thing happen
without it actually
taking place in
the same way.
Question in context
• Does encryption stop data being stolen by a
hacker?
– No, It will not stop a hacker from stealing the
data, but the data will be unreadable.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 8
Types of data encryption
1. Symmetric data encryption.
2. Asymmetric data encryption
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 9
Types of data encryption –
1. Symmetric data encryption
1. Symmetric data encryption.
– Uses an encryption key: the same key used to
encrypt and decrypt the data.
Example: 10 digit encryption key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 10
plaintext
encryption key
ciphertext
Data encryption simulation –
Symmetric encryption
Activity:
• Use the simulation tool available in the below
link to find how symmetric encryption works
really.
https://codebeautify.org/encrypt-decrypt
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 11
Symmetric data encryption -
Question in context
• Is this enough to keep the data safe?
– No, because in a symmetric encryption, a
single key is shared between sender and the
receiver.
– It is a matter of seconds for the modern
computers to decode an encrypted message
using a single key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 12
Keywords
Decode:
Metaphor of the
decryption.
2. Asymmetric data encryption.
– Uses different keys for encrypting and
decrypting the data.
• Public key = (Available for everyone)
• Private key = (Only available for the receiver’s
computer)
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 13
Keywords
Public key: a key
which is made
available by the
receiver to the
sender to send
the data.
Private key: a key
which is available
in the receiver’s
computer only to
decrypt the data
that arrived from
the sender.
Step 01 Step 02
Types of data encryption –
2. Asymmetric data encryption
Data encryption simulation –
Asymmetric encryption
Activity:
• Use the simulation tool available in the below
link to find how asymmetric encryption works
really.
https://www.javainuse.com/rsagenerator
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 14
Asymmetric data encryption -
Question in context
• Is this enough to keep the data safe?
– This method is more than enough to keep the data
safe because the private key will be available only on
the receiver's computer which is used to decrypt the
message.
– The senders will send the message to the receivers
using public key only, no one knows the receiver’s
private key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 15
Q & A
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 16
Thank you
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 17

More Related Content

Similar to Data encryption.pptx

A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
04 authentication
04 authentication04 authentication
04 authenticationJadavsejal
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and CryptographyJack Davis
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxskknowledge
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 

Similar to Data encryption.pptx (20)

A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
04 authentication
04 authentication04 authentication
04 authentication
 
Security
SecuritySecurity
Security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
s117
s117s117
s117
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Data encryption.pptx

  • 1. Data encryption SMS Hasan (Sharqi) (BSc) Computer Science Teacher - Cambridge Section Yara International School, Riyadh - KSA hasan.edu21@gmail.com +966 57 087 58 28 24-NOV-2021
  • 2. Data encryption • Internet is world wide network • We exchange a lot of private data on the internet. – Email credentials – Credit card numbers – Private messages – Passwords • It is important to keep the data safe from eavesdroppers during data transmission. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 2 Keywords Encryption: is a method of protecting data during the data transmission. Eavesdroppers: The people who intercept and read our data during the data transmission such as hackers.
  • 3. What is called data encryption? • Data encryption is a process of scrambling data (message) into human unreadable format before the transmission takes place. • This is sometimes called cryptography. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 3 Keywords Scrambling: mixing up and making confusing. Cryptography: is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
  • 4. Data encryption simulation Activity: • Use the simulation tool available in the below link to find how encryption works really. https://www.online-toolz.com/tools/text- encryption-decryption.php 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 4 Keywords Simulation: is a way of seeing a thing happen without it actually taking place in the same way.
  • 5. Data encryption… • Before the encryption takes place, the data is called plain-text. • Then, an encryption algorithm (encryption key) is applied to the data to scramble and make it meaningless, this data will be called ciphertext. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 5 Keywords Plain-text: the name given to data before the encryption Cipher-text: the name given to data after the encryption Algorithm: step by step procedure to solve a problem. plaintext encryption key ciphertext
  • 6. Data encryption… • Now, the ciphertext will be transmitted from sender to receiver. • In the end, once the receiver, received the data, will decrypt the data from ciphertext to plain text using the decryption key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 6 Keywords Sender: the device which sends the data from. Receiver: the device which receives the data from the sender. Decryption: the process of converting the data from ciphertext to plaintext.
  • 7. Data encryption simulation Activity: • Use the simulation tool available in the below link to find how encryption works really. https://codebeautify.org/encrypt-decrypt 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 7 Keywords Simulation: is a way of seeing a thing happen without it actually taking place in the same way.
  • 8. Question in context • Does encryption stop data being stolen by a hacker? – No, It will not stop a hacker from stealing the data, but the data will be unreadable. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 8
  • 9. Types of data encryption 1. Symmetric data encryption. 2. Asymmetric data encryption 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 9
  • 10. Types of data encryption – 1. Symmetric data encryption 1. Symmetric data encryption. – Uses an encryption key: the same key used to encrypt and decrypt the data. Example: 10 digit encryption key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 10 plaintext encryption key ciphertext
  • 11. Data encryption simulation – Symmetric encryption Activity: • Use the simulation tool available in the below link to find how symmetric encryption works really. https://codebeautify.org/encrypt-decrypt 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 11
  • 12. Symmetric data encryption - Question in context • Is this enough to keep the data safe? – No, because in a symmetric encryption, a single key is shared between sender and the receiver. – It is a matter of seconds for the modern computers to decode an encrypted message using a single key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 12 Keywords Decode: Metaphor of the decryption.
  • 13. 2. Asymmetric data encryption. – Uses different keys for encrypting and decrypting the data. • Public key = (Available for everyone) • Private key = (Only available for the receiver’s computer) 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 13 Keywords Public key: a key which is made available by the receiver to the sender to send the data. Private key: a key which is available in the receiver’s computer only to decrypt the data that arrived from the sender. Step 01 Step 02 Types of data encryption – 2. Asymmetric data encryption
  • 14. Data encryption simulation – Asymmetric encryption Activity: • Use the simulation tool available in the below link to find how asymmetric encryption works really. https://www.javainuse.com/rsagenerator 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 14
  • 15. Asymmetric data encryption - Question in context • Is this enough to keep the data safe? – This method is more than enough to keep the data safe because the private key will be available only on the receiver's computer which is used to decrypt the message. – The senders will send the message to the receivers using public key only, no one knows the receiver’s private key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 15
  • 16. Q & A 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 16
  • 17. Thank you 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 17