Ghaffa Ndaru Sandyeta Bin Marsudi - (32DDT20F2034) Muhammad Azeem Amirul Bin Mohd Zulkeflee - (32DDT20F2031)
Ghaffa Ndaru Sandyeta Bin Marsudi - (32DDT20F2034) Muhammad Azeem Amirul Bin Mohd Zulkeflee - (32DDT20F2031)
Importance of Summary
Encryption
Introduction
What is Data Encryption?
● Private Key
Common Asymmetric encryption methods:
Data Encryption
Triple DES Twofish
Standards (DES)
DES is a low-level Triple DES runs DES Twofish is considered
encryption block cipher encryption three one of the fastest
algorithm that converts different times by encryption algorithms
plain text in blocks of 64 encrypting, decrypting, and is free to use.
bits and converts them to and then encrypting
ciphertext using keys of data again
48 bits
Importance of Encryption
Why Encryption Matters
Internet privacy
concerns are real Considered as
Regulations
Importance of
Hacking is big
Encryption
business
IMPORTANCE OF
ENCRYPTION
Encryption plays an important role in securing many different types of information
technology (IT) assets. It provides the following:
Confidentiality Authentication
Encodes the message's Verifies the origin of a
content message
Integrity Nonrepudiation
Proves the contents of a message
Prevents senders from denying
have not been changed since it was
they sent the encrypted message
sent.
Summary
There are massive amounts of sensitive information managed and
stored online in the cloud or on connected servers. Encryption
uses cybersecurity to defend against brute-force and cyber-
attacks, including malware and ransomware. Data encryption
works by securing transmitted digital data on the cloud and
computer systems. There are two kinds of digital data,
transmitted data or in-flight data and stored digital data or data at
rest.
Modern encryption algorithms have replaced the outdated Data
Encryption Standard to protect data. These algorithms guard
information and fuel security initiatives including integrity,
authentication, and non-repudiation. The algorithms first authenticate a
message to verify the origin. Next. they check the integrity to verify
that contents have remained unchanged. Finally, the non-repudiation
initiative stops sends from denying legitimate activity.
Our Sources
https://searchsecurity.techtarget.com/definition/encryptio
n
https://us.norton.com/internetsecurity-privacy-what-is-enc
ryption.html
Thank You for
Watching!