Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Encryption

4,543 views

Published on

Published in: Education, Technology
  • Be the first to comment

Encryption

  1. 1. ENCRYPTION Mrs. Vasanthi Muniasamy 1
  2. 2. SEQUENCE INTRODUCTION HISTORY ENCRYPTION TYPES OF ENCRYPTION METHODS OF ENCRYPTION USES CONCLUSION 2
  3. 3. INTRODUCTION CRYPTOGRAPHY: Science of encryption and decryption; converting between plaintext and ciphertext ENCRYPTION: Conversion of data into a form, called a ciphertext DECRYPTION To make encrypted information readable again 3
  4. 4. HISTORY Ancient Babylonian merchants used intaglio A piece of flat stone carved into images and writings Using this, they are producing what we today call ‘Digital Signature’ 4
  5. 5. ENCRYPTION Process of transforming information Using cipher (algorithm) Unreadable to everyone except the one having key 5
  6. 6. 6
  7. 7. TYPES OF ENCRYPTION 1. MANUAL ENCRYPTION: Use of encryption software User’s participation Great for PCs 2. TRANSPARENT ENCRYPTION: Most secure type of encryption Encrypts everything on computer 7
  8. 8. TYPES OF ENCRYPTION…(cont’d) 3. SYMMETRIC ENCRYPTION: Most simplest type Code up yourself Only one key needed Safe method needed for transmission of key 8
  9. 9. TYPES OF ENCRYPTION…(cont’d) 9
  10. 10. TYPES OF ENCRYPTION…(cont’d) 4. ASYMMETRIC ENCRYPTION: Done electronically Public key is posted for the public to encrypt Decrpytion done only by private key 10
  11. 11. TYPES OF ENCRYPTION…(cont’d) 11
  12. 12. METHODS OF ENCRYPTION Consists of two main categories Stream Encryption: Clear text encrypted character by character Block Cipher Encryption: Clear text encrypted block by block 12
  13. 13. USES OF ENCRYPTION Protect information on your computer. Protect information in transit Wireless phones 13
  14. 14. USES OF ENCRYPTION … (cont’d) Confidentiality of medical, personal and transaction records Email program Digital signature 14
  15. 15. CONCLUSION Contrary to what most people think, encryption is not a new thing Encryption is being commonly used to facilitate secret communication Encryption is used to protect data at rest and at transit 15
  16. 16. 16 THANK YOU!

×