SlideShare a Scribd company logo
Data Encryption
Presented By:
Deepam Goyal
Department of Mechanical Engineering
UIET, Panjab University Chandigarh
Data Encryption
 Encryption Definition:
 The action of disguising information so that it can be recovered
easily by the persons who have the key, but is highly resistant to
recovery by persons who do not have the key.
 encryption is the process of transforming information (referred to
as plaintext) using an algorithm (called cipher) to make it
unreadable to anyone except those possessing special knowledge,
usually referred to as a key
Data Encryption
 The encryption key may be changed from time to time
to make an intruder’s task more difficult.
 Restoration of a ciphertext to cleartext is achieved by the
action of decryption using a decryption key.
Data Encryption
 A message is cleartext (plaintext) is encrypted
(disguised) through the use of an encryption key to
create a Ciphertext.
Data Encryption
 In symmetric (Single key):
 The encryption and decryption keys are the same.
 In asymmetric (two keys):
 The encryption and decryption keys are different.
Comparison of Symmetrical and
Asymmetrical Cryptography
Data Encryption
 Encryption Methods:
 Encryption is accomplished by scrambling the bits,
characters, words, or phrases in the original message.
Scrambling involves two activities:
 Transposition
 Substitution
Data Encryption
 Transposition:
 In which the order of the bits patterns, characters, words
or phrases is rearranged.
 The word “hello” can be written backwards as “OLLEH”.
 Substitution:
 In which new bit patterns, characters, words, or phrases
are substituted for the originals without changing their
order.
Data Encryption
 Data Encryption Standard (DES):
 Most widely used algorithm
 Pioneered by IBM
 It is symmetric cryptosystem
 Developed to protect sensitive, unclassified, US
government, Computer data.
 Used to provide authentication of electronic funds
transfer messages.
Why encrypt?
 Protect data even in the event of a security breach
 Safeguard patient information
 HIPAA compliance, and
TO AVOID
 Financial loss (large fines, lost patients & revenue)
 Legal ramifications (regulatory or civil prosecution)
 Damage to professional image (negative publicity & media
fallout)
Data Encryption
DES Algorithm:
 The algorithm accepts plaintext, P, and performs an
initial permutation, IP, on P producing P0, The block is
then broken into left and right halves, the Left (L0)
being the first 32 bits of P0 and the right (R0) being the
last 32 bits of P0.
 With L0 and R0, 16 rounds are performed until L16 and
R16 are generated.
 The inverse permutation, IP-1, is applied to L16R16 to
produce ciphertext C.
Data Encryption
 Public Key Cryptosystem
 It is an asymmetric cryptosystem.
 First announced in 1976.
 Offer a radically different approach to encryption.
 The idea depends on the use of a pair of keys that differ
in a complementary way.
 Several algorithms are proposed
 RSA algorithm is considered to be highly secure.
Data Encryption
 Public key encryption can achieved:
 Privacy
 Authentication
MEANING
 A digital signature is an electronic signature that can be
used to authenticate the identity of the sender of a message
or the signer of a document, and possibly to ensure that the
original content of the message or document that has been
sent is unchanged.
 Digital signatures are easily transportable, cannot be
imitated by someone else, and can be automatically time-
stamped. The ability to ensure that the original signed
message arrived means that the sender cannot easily
repudiate it later.
 A digital signature can be used with any kind of
message, whether it is encrypted or not, simply so
that the receiver can be sure of the sender's identity
and that the message arrived intact. A digital
certificate contains the digital signature of the
certificate-issuing authority so that anyone can verify
that the certificate is real.
HOW IT WORKS Original
message
Hash function
Sender’s
private key
Cipher
text(including
hash digest)
Sender’s
public key
Recipient’s
private key
Hash
receiver
Creating a Digital Signature
Hash
Function
Jrf843kjfgf*£$&Hdi
f*7oUsd*&@:<CH
DFHSD(**
Py75c%bn&*)9|fDe^b
DFaq#xzjFr@g5=&nm
dFg$5knvMd’rkvegMs”
This is a really long
message about Bill’s…
Asymmetric
Encryption
Message or File Digital Signature
128 bits Message Digest
Calculate a short
message digest from even
a long input using a one-
way message digest
function (hash)
Signatory’s
private key
private
Verifying a Digital Signature
Jrf843kjf
gf*£$&Hd
if*7oUsd
*&@:<CHD
FHSD(**
Py75c%bn&*)
9|fDe^bDFaq
#xzjFr@g5=
&nmdFg$5kn
vMd’rkvegMs”
Asymmetric
decryption
(e.g. RSA)
Everyone has
access to trusted
public key of the
signatory
Signatory’s
public key
Digital Signature
This is a
really long
message
about Bill’s…
Same hash function
(e.g. MD5, SHA…)
Original Message
Py75c%bn&*)
9|fDe^bDFaq
#xzjFr@g5=
&nmdFg$5kn
vMd’rkvegMs”
? == ?
Are They Same?
23
Certificate:
 body of data placed in a message to serve as
Proof of the sender’s authenticity.
 consists of encrypted information that associates
a public key with the true identity of an individual
 Includes the identification and electronic signature of
Certificate Authority (CA).
 Includes serial number and period of time when the
certificate is Valid
24
Certificate Authority :
 trusted organization that issues certificates for
both servers and clients.
create digital certificates that
securely bind the names of users to
their public keys.
Two types of CA:
* Commercial CA
* Self-certified private CA
Typ es of cer t ificat es
Root
CERT
eeeee
SERVER
CERT
CLIENT
CERT
OBJECT
SIGNING
CERT
OBJECT
CERT
THANKS
Email ID: bkdeepamgoyal@gmail.com

More Related Content

What's hot

Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
reshmy12
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
encryption and decryption
encryption and decryptionencryption and decryption
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography ppt
Cryptography pptCryptography ppt
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Adarsh Kumar Yadav
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 

What's hot (20)

Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
cryptography
cryptographycryptography
cryptography
 
encryption and decryption
encryption and decryptionencryption and decryption
encryption and decryption
 
Network Security
Network SecurityNetwork Security
Network Security
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Email security
Email securityEmail security
Email security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Data encryption

Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Neha Bhambu
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
ijtsrd
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Cryptography
CryptographyCryptography
Cryptography
Vishalya Dulam
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
muthulx
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
sunil sharma
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
Sanjeev Kumar Jaiswal
 

Similar to Data encryption (20)

Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Cryptography & Network Security.pptx
Cryptography & Network Security.pptxCryptography & Network Security.pptx
Cryptography & Network Security.pptx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Information Security
Information SecurityInformation Security
Information Security
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 

More from Deepam Goyal

Robotics
RoboticsRobotics
Robotics
Deepam Goyal
 
Explosion welding : A Solid State Welding Process
Explosion welding : A Solid State Welding ProcessExplosion welding : A Solid State Welding Process
Explosion welding : A Solid State Welding Process
Deepam Goyal
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
Deepam Goyal
 
Experimental Determination of Tool-chip Interface Temperatures
Experimental Determination of Tool-chip Interface TemperaturesExperimental Determination of Tool-chip Interface Temperatures
Experimental Determination of Tool-chip Interface Temperatures
Deepam Goyal
 
Extrusion
ExtrusionExtrusion
Extrusion
Deepam Goyal
 
Nickel & Its Alloys
Nickel & Its AlloysNickel & Its Alloys
Nickel & Its Alloys
Deepam Goyal
 
Forecasting :- Introduction & its Applications
Forecasting :-  Introduction & its ApplicationsForecasting :-  Introduction & its Applications
Forecasting :- Introduction & its Applications
Deepam Goyal
 

More from Deepam Goyal (7)

Robotics
RoboticsRobotics
Robotics
 
Explosion welding : A Solid State Welding Process
Explosion welding : A Solid State Welding ProcessExplosion welding : A Solid State Welding Process
Explosion welding : A Solid State Welding Process
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
Experimental Determination of Tool-chip Interface Temperatures
Experimental Determination of Tool-chip Interface TemperaturesExperimental Determination of Tool-chip Interface Temperatures
Experimental Determination of Tool-chip Interface Temperatures
 
Extrusion
ExtrusionExtrusion
Extrusion
 
Nickel & Its Alloys
Nickel & Its AlloysNickel & Its Alloys
Nickel & Its Alloys
 
Forecasting :- Introduction & its Applications
Forecasting :-  Introduction & its ApplicationsForecasting :-  Introduction & its Applications
Forecasting :- Introduction & its Applications
 

Recently uploaded

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 

Data encryption

  • 1. Data Encryption Presented By: Deepam Goyal Department of Mechanical Engineering UIET, Panjab University Chandigarh
  • 2. Data Encryption  Encryption Definition:  The action of disguising information so that it can be recovered easily by the persons who have the key, but is highly resistant to recovery by persons who do not have the key.  encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key
  • 3. Data Encryption  The encryption key may be changed from time to time to make an intruder’s task more difficult.  Restoration of a ciphertext to cleartext is achieved by the action of decryption using a decryption key.
  • 4. Data Encryption  A message is cleartext (plaintext) is encrypted (disguised) through the use of an encryption key to create a Ciphertext.
  • 5. Data Encryption  In symmetric (Single key):  The encryption and decryption keys are the same.  In asymmetric (two keys):  The encryption and decryption keys are different.
  • 6. Comparison of Symmetrical and Asymmetrical Cryptography
  • 7. Data Encryption  Encryption Methods:  Encryption is accomplished by scrambling the bits, characters, words, or phrases in the original message. Scrambling involves two activities:  Transposition  Substitution
  • 8. Data Encryption  Transposition:  In which the order of the bits patterns, characters, words or phrases is rearranged.  The word “hello” can be written backwards as “OLLEH”.  Substitution:  In which new bit patterns, characters, words, or phrases are substituted for the originals without changing their order.
  • 9.
  • 10. Data Encryption  Data Encryption Standard (DES):  Most widely used algorithm  Pioneered by IBM  It is symmetric cryptosystem  Developed to protect sensitive, unclassified, US government, Computer data.  Used to provide authentication of electronic funds transfer messages.
  • 11.
  • 12.
  • 13. Why encrypt?  Protect data even in the event of a security breach  Safeguard patient information  HIPAA compliance, and TO AVOID  Financial loss (large fines, lost patients & revenue)  Legal ramifications (regulatory or civil prosecution)  Damage to professional image (negative publicity & media fallout)
  • 14. Data Encryption DES Algorithm:  The algorithm accepts plaintext, P, and performs an initial permutation, IP, on P producing P0, The block is then broken into left and right halves, the Left (L0) being the first 32 bits of P0 and the right (R0) being the last 32 bits of P0.  With L0 and R0, 16 rounds are performed until L16 and R16 are generated.  The inverse permutation, IP-1, is applied to L16R16 to produce ciphertext C.
  • 15. Data Encryption  Public Key Cryptosystem  It is an asymmetric cryptosystem.  First announced in 1976.  Offer a radically different approach to encryption.  The idea depends on the use of a pair of keys that differ in a complementary way.  Several algorithms are proposed  RSA algorithm is considered to be highly secure.
  • 16. Data Encryption  Public key encryption can achieved:  Privacy  Authentication
  • 17.
  • 18. MEANING  A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.  Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time- stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.
  • 19.  A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.
  • 20. HOW IT WORKS Original message Hash function Sender’s private key Cipher text(including hash digest) Sender’s public key Recipient’s private key Hash receiver
  • 21. Creating a Digital Signature Hash Function Jrf843kjfgf*£$&Hdi f*7oUsd*&@:<CH DFHSD(** Py75c%bn&*)9|fDe^b DFaq#xzjFr@g5=&nm dFg$5knvMd’rkvegMs” This is a really long message about Bill’s… Asymmetric Encryption Message or File Digital Signature 128 bits Message Digest Calculate a short message digest from even a long input using a one- way message digest function (hash) Signatory’s private key private
  • 22. Verifying a Digital Signature Jrf843kjf gf*£$&Hd if*7oUsd *&@:<CHD FHSD(** Py75c%bn&*) 9|fDe^bDFaq #xzjFr@g5= &nmdFg$5kn vMd’rkvegMs” Asymmetric decryption (e.g. RSA) Everyone has access to trusted public key of the signatory Signatory’s public key Digital Signature This is a really long message about Bill’s… Same hash function (e.g. MD5, SHA…) Original Message Py75c%bn&*) 9|fDe^bDFaq #xzjFr@g5= &nmdFg$5kn vMd’rkvegMs” ? == ? Are They Same?
  • 23. 23 Certificate:  body of data placed in a message to serve as Proof of the sender’s authenticity.  consists of encrypted information that associates a public key with the true identity of an individual  Includes the identification and electronic signature of Certificate Authority (CA).  Includes serial number and period of time when the certificate is Valid
  • 24. 24 Certificate Authority :  trusted organization that issues certificates for both servers and clients. create digital certificates that securely bind the names of users to their public keys. Two types of CA: * Commercial CA * Self-certified private CA
  • 25. Typ es of cer t ificat es Root CERT eeeee SERVER CERT CLIENT CERT OBJECT SIGNING CERT OBJECT CERT