0% found this document useful (0 votes)
18 views16 pages

Encryption

Uploaded by

Neha Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views16 pages

Encryption

Uploaded by

Neha Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16

What is Encryption?

What is Encryption?
• Encryption is the process of encoding
messages or
information in such a way that only authorized
parties
A process
•can read it that converts original information,
also called
plain text into a difficult-to-interpret form called
ciphertext
• Encryption does not of itself prevent
denies the message
interception, but content to the
interceptor
• Done by using an encryption algorithm, a formula
turn
used toplain text into
ciphertext.
Cryptography
The field of study related to encoded
information (comes from Greek word for
"secret writing")
Encryption
The process of converting plaintext into
ciphertext
Decryption
The process of converting ciphertext into
plaintext
Encryption

plaintext ciphertext
message message
Decryption

Cipher
An algorithm used to encrypt and decrypt text
Key
The set of parameters that guide a cipher Neither is any good
without the other
Types of Encryption:
-Symmetric Key
Encryption
-Asymmetric Key
Encryption
Symmetric Key Encryption
• A secret key, is applied to the text of a message to
change the
content in a particular way
• uses the same keys for both encryption of plaintext
and
decryption of ciphertext.
transformation to go between the
twokeys
••The
The keys.
keys,may be identical
in practice, or there
represent may besecret
a shared a simple
between two
or more parties that can be used to maintain a private
information link
• both parties have access to the secret key which is
one of the
main drawbacks of symmetric key encryption, in
comparison
Example of Symmetric Key Cipher : Additive cipher

Note

When the cipher is additive, the plaintext,


ciphertext, and key are integers in Z26.
Example of symmetric key cipher
3.2.1 Continued
Example 3.3

Use the additive cipher with key = 15 to encrypt the message “hello”.

Solution

We apply the encryption algorithm to the plaintext, character by


character:
3.2.1 Continued
Example 3.4

Use the additive cipher with key = 15 to decrypt the message


“WTAAD”.
Solution

We apply the decryption algorithm to the plaintext character by


character:
Asymmetric Key
Encryption
 Known as public-private key or public key
encryption
 Uses key pairs for encrypting or decrypting data
 Public key is used to encrypt the data and private
key is used
toonly
decrypt the data by using the matching public
be decrypted
key.
Any message that is encrypted by using the
private keyability
encryption
 It has can to share secret data without
key
sharing the same
Asymmetric Key
Encryption
Which one is
better?
 Although, symmetric encryption is fast, it is not as
safe as
asymmetric encryption because someone could steal
the key
and decode the messages. But because of its speed,
it's
 Asymmetric key encryption requires far more
commonly used for e-commerce transactions
computation
to both encrypt and decrypt the content of the
message. So,
the process takes longer. It has the ability to share
the data
without sharing the same encryption key
Why use
encryption?
• Authentication
• Protects personal data such as passwords.
• Privacy
• Provides for confidentiality of private information.
• Integrity
• Ensures that a document or file has not been
altered.
• Accountability
• Prevents denial or
plagiarism.
How prevalent is
it?
 According to InformationWeek
Research:
 Of 500 sites surveyed, two-thirds report using
protect company
encryption to
data.
Of 500 companies surveyed, 43% use encryption on
both
stored and transmitted data. More than three out of
five
companies
 Of 28% ofencrypt due to the
sites surveyed, threat of outsiders
government
intercepting
encryption
regulation of stored and
requires
sensitive
 For 38%data.
transmitted data.
of companies, the complexity of the
obstacle is an
technology
.
Thank You

You might also like