0% found this document useful (0 votes)
57 views18 pages

Ghaffa Ndaru Sandyeta Bin Marsudi - (32DDT20F2034) Muhammad Azeem Amirul Bin Mohd Zulkeflee - (32DDT20F2031)

This document discusses data encryption, including how it works, types of encryption methods, and the importance of encryption. It begins by explaining how data encryption translates plaintext into ciphertext using encryption keys, and decrypts it back using decryption keys. There are two main types of encryption: asymmetric encryption which uses public and private keys, and symmetric encryption which uses a single shared key. Common encryption algorithms are also outlined. The summary concludes that encryption is important as it provides confidentiality, authentication, integrity, and non-repudiation of digital data to defend against cyber threats and secure information online and in storage.

Uploaded by

Triple DDD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views18 pages

Ghaffa Ndaru Sandyeta Bin Marsudi - (32DDT20F2034) Muhammad Azeem Amirul Bin Mohd Zulkeflee - (32DDT20F2031)

This document discusses data encryption, including how it works, types of encryption methods, and the importance of encryption. It begins by explaining how data encryption translates plaintext into ciphertext using encryption keys, and decrypts it back using decryption keys. There are two main types of encryption: asymmetric encryption which uses public and private keys, and symmetric encryption which uses a single shared key. Common encryption algorithms are also outlined. The summary concludes that encryption is important as it provides confidentiality, authentication, integrity, and non-repudiation of digital data to defend against cyber threats and secure information online and in storage.

Uploaded by

Triple DDD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Ghaffa Ndaru Sandyeta bin Marsudi - [32DDT20F2034]

Muhammad Azeem Amirul Bin Mohd Zulkeflee –[32DDT20F2031]


TABLE OF CONTENTS

Introduction How does it Types of Data


Work? Encryption

Importance of Summary
Encryption
Introduction
What is Data Encryption?

Data encryption is a way of translating data


from plaintext (unencrypted) to ciphertext
(encrypted). Users can access encrypted
data with an encryption key and decrypted
data with a decryption key
Encryption is the process of taking plain text, like a
text message or email, and scrambling it into an
unreadable format called “cipher text.” This helps
protect the confidentiality of digital data either stored
on computer systems or transmitted through a
network like the internet.

When the intended recipient accesses the


How does
message, the information is translated back to its
original form. This is called decryption encryption work?

To unlock the message, both the sender and the


recipient have to use a “secret” encryption key —
a collection of algorithms that scramble and
unscramble data back to a readable format.
Types of Data Encryption
Types of Data Encryption
Asymmetric Symmetric
encryption encryption
methods methods
Encrypts and decrypts
the data using two Type of encryption
separate cryptographic where only one secret
asymmetric keys. These symmetric key is used
two keys are known as: to encrypt the plaintext
and decrypt the
● Public Key ciphertext

● Private Key
Common Asymmetric encryption methods:

RSA PUBLIC KEY


RSA, named after computer
scientists Ron Rivest, Adi Public key infrastructure
Shamir, and Leonard (PKI): PKI is a way of
Adleman, is a popular governing encryption keys
algorithm used to encrypt through the issuance and
data with a public key and management of digital
decrypt with a private key for certificates.
secure data transmission
Common Symmetric encryption methods:

Data Encryption
Triple DES Twofish
Standards (DES)
DES is a low-level Triple DES runs DES Twofish is considered
encryption block cipher encryption three one of the fastest
algorithm that converts different times by encryption algorithms
plain text in blocks of 64 encrypting, decrypting, and is free to use.
bits and converts them to and then encrypting
ciphertext using keys of data again
48 bits
Importance of Encryption
Why Encryption Matters
Internet privacy
concerns are real Considered as
Regulations

Importance of
Hacking is big
Encryption
business
IMPORTANCE OF
ENCRYPTION
Encryption plays an important role in securing many different types of information
technology (IT) assets. It provides the following:

Confidentiality Authentication
Encodes the message's Verifies the origin of a
content message

Integrity Nonrepudiation
Proves the contents of a message
Prevents senders from denying
have not been changed since it was
they sent the encrypted message
sent.
Summary
There are massive amounts of sensitive information managed and
stored online in the cloud or on connected servers. Encryption
uses cybersecurity to defend against brute-force and cyber-
attacks, including malware and ransomware. Data encryption
works by securing transmitted digital data on the cloud and
computer systems. There are two kinds of digital data,
transmitted data or in-flight data and stored digital data or data at
rest.
Modern encryption algorithms have replaced the outdated Data
Encryption Standard to protect data. These algorithms guard
information and fuel security initiatives including integrity,
authentication, and non-repudiation. The algorithms first authenticate a
message to verify the origin. Next. they check the integrity to verify
that contents have remained unchanged. Finally, the non-repudiation
initiative stops sends from denying legitimate activity.
Our Sources

https://searchsecurity.techtarget.com/definition/encryptio
n

https://us.norton.com/internetsecurity-privacy-what-is-enc
ryption.html
Thank You for
Watching!

You might also like