Cryptography and Data Encryption
Cryptography and Data Encryption
Group 07 Members
Introduction to Cryptography.
Courtesy of Google
History of Cryptography.
•Ancient
•World War II
•Modern era
Courtesy of Google
Ancient use
Caesar Cipher
(Rome)
Hello = Khoor
Courtesy of Google
Ancient use
Atbash Cipher
Hebrew culture
Hello = Svool
Ancient use
Courtesy of Google
World War II
Japanese Cryptography
The Purple Cipher
Modern era
Asymmetric Key
Courtesy of Google
Goals of Cryptography
Confidentiality Authentication
Integrity
Non-Repudiation Availability
Where You See Cryptography Every Day
3. Performance Issues
Problem: Asymmetric encryption is slow
Solution: Use hybrid encryption (asymmetric for keys, symmetric for data)
4. Outdated Algorithms
Problem: Old algorithms like MD5, SHA-1 are insecure
Solution: Switch to modern algorithms like AES, SHA-256, ECC
5. Quantum Threat
Problem: Quantum computers could break current encryption
Solution: Develop and adopt post-quantum cryptography
Final Thought
Cryptography protects our digital world — from banking to messages.
It's not just about hiding data, it’s about trust, security, and the future.
1. Stay updated. Stay secure.
Introduction to Data Encryption.
Courtesy of Google
Types of Data Encryption
Asymmetric Key
Symmetric Key
Courtesy of Google
Real-World Use Cases of Data
Encryption
Courtesy of Google
Blockchain & Cryptocurrency
Courtesy of Google
End-to-End Encryption
Courtesy of Google
Full Disk Encryption
Courtesy of Google
Future Trends in Encryption
Courtesy of Google
Challenges in Data Encryption
Human Error
Challenge: Mistakes in coding or managing encryption weaken security.
Solution: Train developers, use strong passwords, and automate encryption processes.
Final Thought
Encryption is key to protecting data, but it must be strong, error-free, and aligned with privacy and legal
needs to work effectively.
Courtesy of Google
THANK
YOU