SlideShare a Scribd company logo
1 of 9
WHAT IS ENCRYPTION?
Encryption is the process by
which a readable message is
converted to an unreadable
form to prevent unauthorized
parties from reading it.
WHAT IS DECRYPTION?
• Decryption is also the process of
converting an encrypted message
back to its original
format(readable).
• The original message is called the
plaintext message.
• 1. PLAIN TEXT: Plain text is readable unencrypted message.
• 2.CIPHER TEXT: Cipher text is unreadable encrypted
message.
• 3.PRIVATE KEY: Private key is used to decode the encrypted
data at receiver’s end.
• 4.PUBLIC KEY: Public key is used to encrypt the message at
sender’s end.
ENCRYPTION: IT IS THE
PROCESS OF CONVERTING
PLAIN TEXT INTO CIPHER TEXT
DECRYPTION: IT IS THE
PROCESS OF CONVERTING CIPHER
TEXT INTO PLAIN TEXT.
PROCESS OF ENCRYPTION AND
DECRYPTION
FACTS ENCRYPTION
Where it takes place At the sender’s end
Key used Secret key or Public key is used to encrypt the message
Participants After Encryption the sender delivers data to the recipient
Encrypted text Non-readable and appears as a long string of random numbers
and letters
Why Encryption is used For secure transmission and storage of sensitive data
FACTS DECRYPTION
Where it takes place At the receiver’s end
Key used Secret key or private key is used to decrypt the message
Participants The recipient after receiving the encrypted message sent by
sender, decodes it using private key
Decrypted text readable
Why decryption is used Only authorized persons can access the sensitive data by using
private key or password
THANK YOU.
KARNIKA B
21BCC523

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityshraddha mane
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1Shobhit Sharma
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 

What's hot (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Email security
Email securityEmail security
Email security
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Data encryption
Data encryptionData encryption
Data encryption
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Email security
Email securityEmail security
Email security
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Encryption and Decryption

Similar to Encryption and Decryption (20)

Encryption
EncryptionEncryption
Encryption
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Confidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptxConfidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptx
 
pgp.ppt.pptx
pgp.ppt.pptxpgp.ppt.pptx
pgp.ppt.pptx
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
NSC PPT 463.pdf
NSC PPT 463.pdfNSC PPT 463.pdf
NSC PPT 463.pdf
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
Email sec11
Email sec11Email sec11
Email sec11
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptxLesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
Lesson 04 - Symmetric and Asymmetric Key Encryptions (1).pptx
 
ch15 (1).ppt
ch15 (1).pptch15 (1).ppt
ch15 (1).ppt
 
ch15.ppt
ch15.pptch15.ppt
ch15.ppt
 

More from RajaKrishnan M

Shortcomings of Demat Account
Shortcomings of Demat AccountShortcomings of Demat Account
Shortcomings of Demat AccountRajaKrishnan M
 
Demat Account Services
Demat Account ServicesDemat Account Services
Demat Account ServicesRajaKrishnan M
 
Depository Participant
Depository ParticipantDepository Participant
Depository ParticipantRajaKrishnan M
 
Services provided in Mobile Banking
Services provided in Mobile BankingServices provided in Mobile Banking
Services provided in Mobile BankingRajaKrishnan M
 
Factors affecting share price
Factors affecting share priceFactors affecting share price
Factors affecting share priceRajaKrishnan M
 
Loss of Confidence of small investors
Loss of Confidence of small investorsLoss of Confidence of small investors
Loss of Confidence of small investorsRajaKrishnan M
 
Technological forces fueling e-commerce
Technological forces fueling e-commerceTechnological forces fueling e-commerce
Technological forces fueling e-commerceRajaKrishnan M
 
Meaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerceMeaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerceRajaKrishnan M
 
Forces Fueling e-commerce
Forces Fueling e-commerceForces Fueling e-commerce
Forces Fueling e-commerceRajaKrishnan M
 
Inter Organizational e-commerce
Inter Organizational e-commerceInter Organizational e-commerce
Inter Organizational e-commerceRajaKrishnan M
 
Factors for the success of m-commerce
Factors for the success of m-commerceFactors for the success of m-commerce
Factors for the success of m-commerceRajaKrishnan M
 
Advantages of E-Commerce
Advantages of E-CommerceAdvantages of E-Commerce
Advantages of E-CommerceRajaKrishnan M
 
E-Commerce and E- Businesss
E-Commerce and E- BusinesssE-Commerce and E- Businesss
E-Commerce and E- BusinesssRajaKrishnan M
 
Electronic Data Interchange & Internet
Electronic Data Interchange & InternetElectronic Data Interchange & Internet
Electronic Data Interchange & InternetRajaKrishnan M
 
Performance of contract
Performance of contract Performance of contract
Performance of contract RajaKrishnan M
 

More from RajaKrishnan M (20)

Shortcomings of Demat Account
Shortcomings of Demat AccountShortcomings of Demat Account
Shortcomings of Demat Account
 
Demat Account Services
Demat Account ServicesDemat Account Services
Demat Account Services
 
Depository Participant
Depository ParticipantDepository Participant
Depository Participant
 
Services provided in Mobile Banking
Services provided in Mobile BankingServices provided in Mobile Banking
Services provided in Mobile Banking
 
Ombudsman scheme
Ombudsman scheme Ombudsman scheme
Ombudsman scheme
 
Factors affecting share price
Factors affecting share priceFactors affecting share price
Factors affecting share price
 
Rights of investors
Rights of investorsRights of investors
Rights of investors
 
Loss of Confidence of small investors
Loss of Confidence of small investorsLoss of Confidence of small investors
Loss of Confidence of small investors
 
Facilities by BSE
Facilities by BSEFacilities by BSE
Facilities by BSE
 
Technological forces fueling e-commerce
Technological forces fueling e-commerceTechnological forces fueling e-commerce
Technological forces fueling e-commerce
 
Meaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerceMeaning, Anatomy and Forces Fueling e-commerce
Meaning, Anatomy and Forces Fueling e-commerce
 
Forces Fueling e-commerce
Forces Fueling e-commerceForces Fueling e-commerce
Forces Fueling e-commerce
 
Inter Organizational e-commerce
Inter Organizational e-commerceInter Organizational e-commerce
Inter Organizational e-commerce
 
Factors for the success of m-commerce
Factors for the success of m-commerceFactors for the success of m-commerce
Factors for the success of m-commerce
 
Advantages of E-Commerce
Advantages of E-CommerceAdvantages of E-Commerce
Advantages of E-Commerce
 
Types of E-Commerce
Types of E-CommerceTypes of E-Commerce
Types of E-Commerce
 
E-Commerce and E- Businesss
E-Commerce and E- BusinesssE-Commerce and E- Businesss
E-Commerce and E- Businesss
 
RFID
RFIDRFID
RFID
 
Electronic Data Interchange & Internet
Electronic Data Interchange & InternetElectronic Data Interchange & Internet
Electronic Data Interchange & Internet
 
Performance of contract
Performance of contract Performance of contract
Performance of contract
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Encryption and Decryption

  • 1.
  • 2. WHAT IS ENCRYPTION? Encryption is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it.
  • 3. WHAT IS DECRYPTION? • Decryption is also the process of converting an encrypted message back to its original format(readable). • The original message is called the plaintext message.
  • 4. • 1. PLAIN TEXT: Plain text is readable unencrypted message. • 2.CIPHER TEXT: Cipher text is unreadable encrypted message. • 3.PRIVATE KEY: Private key is used to decode the encrypted data at receiver’s end. • 4.PUBLIC KEY: Public key is used to encrypt the message at sender’s end.
  • 5. ENCRYPTION: IT IS THE PROCESS OF CONVERTING PLAIN TEXT INTO CIPHER TEXT DECRYPTION: IT IS THE PROCESS OF CONVERTING CIPHER TEXT INTO PLAIN TEXT. PROCESS OF ENCRYPTION AND DECRYPTION
  • 6. FACTS ENCRYPTION Where it takes place At the sender’s end Key used Secret key or Public key is used to encrypt the message Participants After Encryption the sender delivers data to the recipient Encrypted text Non-readable and appears as a long string of random numbers and letters Why Encryption is used For secure transmission and storage of sensitive data
  • 7. FACTS DECRYPTION Where it takes place At the receiver’s end Key used Secret key or private key is used to decrypt the message Participants The recipient after receiving the encrypted message sent by sender, decodes it using private key Decrypted text readable Why decryption is used Only authorized persons can access the sensitive data by using private key or password
  • 8.