Encryption
Encryption
ENCRYPTION
TOPICS
EN C RY PT I O N DIFFERE NT L EVEL S
E NCRYPT ION
Asymmetric encryption & usage's
Symmetric encryption & usage's Application-level
Hash encryption & usage's Filesystem-level
HOW TO USE
T RANSPARE NT DATA
E NCRYPT ION ON T HE
DATABASE
ENCRYPTION:
Is the process of protecting information or data by using mathematical models to scramble it in
such a way that only the parties who have the key to unscramble it can access it.
The original form of a data is known as plaintext, and the encrypted form is
called ciphertext
WHY DO WE USE ENCRYPTION:
• data cannot easily be read, modified, or fabricated
encryption : decrypts
02
asymmetric (public key encryption)
Asymmetric encryption: one key encrypts, a different key
decrypts
03
hash
One-Way Encryption , ther is no decryption for it
01 symmetric :
(secret key)
In symmetric encryption, the data is transformed into ciphertext (encrypted form) using the
secret key, and then it can be transmitted over an insecure channel, such as the internet. The
receiver, who possesses the same secret key, can then decrypt the ciphertext back into its
original plaintext (unencrypted form) using the same key.
02 asymmetric:
(public-key encryption)
is a cryptographic method that uses a pair of keys for encrypting and decrypting data
a public key and a private key
The public key is made available to anyone who wants to send encrypted data to the
owner of the key, while the private key is kept secret by the owner. The public key is
used for encryption, and the private key is used for decryption. This means that data
encrypted with the public key can only be decrypted with the corresponding private
key, and vice versa
03 Hash Encryption :
Hash encryption is a type of encryption that uses a one-way function to convert plain text
into a fixed-length string of characters. The resulting hash value is unique to the input
data and cannot be reversed to obtain the original data. Hash encryption is often used for
password storage, as the hash value can be stored in the database instead of the actual
password.