0% found this document useful (0 votes)
15 views

Module 5 Cryptography

Here are five examples each of where asymmetric and symmetric encryption are used in everyday technologies: Asymmetric encryption: 1. HTTPS/TLS for secure web browsing 2. SSH for secure remote access 3. PGP/GPG for encrypting emails and files 4. Digital signatures for verifying software/document authenticity 5. Secure login for websites and apps Symmetric encryption: 1. WiFi networks use WPA/WPA2 encryption 2. Hard disk encryption on computers and phones 3. Encrypted messaging apps like WhatsApp and Signal 4. DVD/Blu-ray disc encryption 5. File encryption on cloud services like Dropbox Some other key differences between
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Module 5 Cryptography

Here are five examples each of where asymmetric and symmetric encryption are used in everyday technologies: Asymmetric encryption: 1. HTTPS/TLS for secure web browsing 2. SSH for secure remote access 3. PGP/GPG for encrypting emails and files 4. Digital signatures for verifying software/document authenticity 5. Secure login for websites and apps Symmetric encryption: 1. WiFi networks use WPA/WPA2 encryption 2. Hard disk encryption on computers and phones 3. Encrypted messaging apps like WhatsApp and Signal 4. DVD/Blu-ray disc encryption 5. File encryption on cloud services like Dropbox Some other key differences between
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

CRYPTOG

RAPHY
Cryptography is the
process of hiding or coding
information so that only the
person a message was
intended for can read it.
Cryptography remains important to
protecting data and users, ensuring
confidentiality, and preventing cyber
criminals from intercepting sensitive
corporate information.
FUNDAMENTALS OF
CRYPTOGRAPHY

NON- KEY
CONFIDENTIALITY INTEGRITY AUTHENTICATION
REPUDIATION MANAGEMENT
confidentiality

Cryptographic techniques, such as


encryption, can be used to protect the
confidentiality of information by making it
unreadable to anyone who does not have
the proper decryption key.
INTEGRITY

Cryptographic techniques, such as hash


functions, can be used to ensure the
integrity of information by providing a
way to detect any changes to the data.
AUTHENTIC
ATION
Cryptographic techniques, such as digital
signatures, can be used to authenticate the
identity of a user or device in a secure
manner.
NON-
REPUDIATIO
N
Cryptographic techniques, such as digital
signatures, can be used to provide non-
repudiation by allowing the sender of a
message to prove that they sent the
message and the receiver to prove that
they received the message.
KEY
MANAGEME
NT
Proper key management is essential for the
security of a cryptographic system, as the
security of the system depends on the
secrecy of the key.
DATA
ENCRYPTI
Data encryption is a fundamental technique in
cybersecurity and ONinformation security that
involves converting plaintext (human-readable
data) into ciphertext (unreadable data) to
protect it from unauthorized access.
ENCRYPTION AND
DECRYPTION
ENCRYPTION AND
DECRYPTION Encryption is the process by which a
readable message is converted to an
unreadable form to prevent
unauthorized parties from reading it.

Decryption is the process of


converting an encrypted message
back to its original (readable) format.
SYMMETRIC VS
ASYMMETRIC
SYMMETRIC ASYMMETRIC
ENCRYPTION ENCRYPTION
In this type of encryption, there Was created to solve the
is only one key, and all parties inherent issue of symmetric
involved use the same key to encryption: the need of sharing
encrypt and decrypt a single encryption key that is
information. used both for encrypting and
decrypting data.
SYMMETRIC VS
ASYMMETRIC
SYMMETRIC ASYMMETRIC
ENCRYPTION ENCRYPTION
In this type of encryption, there Was created to solve the
is only one key, and all parties inherent issue of symmetric
involved use the same key to encryption: the need of sharing
encrypt and decrypt a single encryption key that is
information. used both for encrypting and
decrypting data.
SYMMETRIC
ENCRYPTION
A symmetric key is one that may be used to
encrypt and decode data.

The perks of symmetric encryption are its faster


performance and low resource consumption, but it
is inherently older and less secure than its
counterpart.
ASYMMETRIC
ENCRYPTION
This newer and safer type of encryption method
utilizes two keys for its encryption process, the
public key, used for encryption, and the private
key used for decryption.

A public key is available for anyone who needs to


encrypt a piece of information. A user needs to
have a secondary key, the private key, to decrypt
this information.
HASH
characters into another value.
ING
Hashing is the process of transforming any given key or a string of

• usually represented by a shorter, fixed-length value or key that


represents and makes it easier to find or employ the original string.
• The most popular use for hashing is the implementation of hash
tables.
CHARACTERISTICS
OF HASHING
• It's a one-way function, meaning you can't easily reverse it to get
the original input from the hash value.
• The same input will always produce the same hash value.
• Slight changes in the input will produce drastically different hash
values.
• Hash functions are deterministic and fast.
CRYPTOGRAPHIC
HASH FUNCTIONS
• Special class of hash function that has certain properties which
make it suitable for use in cryptography.
• Mathematical algorithm that maps data of arbitrary size to a bit
string of a fixed size (a hash function)
what is hashing used
for?
DATA RETRIEVAL - Hashing uses
functions or algorithms to map
object data to a representative
integer value. A hash can then be
used to narrow down searches when
locating these items on that object
data map.
what is hashing used
for?
DIGITAL SIGNATURES - hashing
helps encrypt and decrypt
digital signatures used to authenticate
message senders and receivers.

In digital signatures, the message digest


is a critical component.
Message Digest is used
to ensure the integrity of
a message transmitted
over an insecure channel
(where the content of the
message can be
changed).
Assignment: Give
• Provide five examples each of where we use asymmetric and
Encrypt
symmetric encryption in everyday technologies.
• Research what are the other differences of Asymmetric and
Symmetric Encryption.

You might also like