0% found this document useful (0 votes)
14 views

Data Encryption Presentation

Uploaded by

vanshiiit3
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Data Encryption Presentation

Uploaded by

vanshiiit3
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Data Encryption:

Protecting Information in
the Digital Age
Understanding Encryption and the Caesar Cipher

By- Thaw Thaw Zin


Introduction to Why Encryption
Data Encryption Matters
• Data encryption is the • Encryption protects sensitive
process of converting information from
plaintext into ciphertext, unauthorized access.
making it unreadable to
unauthorized users. • It ensures the privacy and
security of data, particularly
• Encryption is crucial in in areas such as:
safeguarding sensitive - Online banking
information, ensuring - Email communication
privacy, and securing data - Data storage and transfer
in various applications such
as online banking, email • Encryption is a vital tool in
communication, and data maintaining trust and integrity
storage. in the digital world.
The Pigpen Cipher: What is It?
•The Pigpen Cipher is a geometric
simple substitution cipher that uses
symbols instead of letters.
It is also known as the Freemason's
cipher because of its association
with Freemasons.
•The cipher uses grids and dots to
replace the letters of the alphabet
with specific symbols.
How the Pigpen Cipher Works
Steps to encrypt using the Pigpen Cipher:
1. Write the plaintext.
2. Replace each letter with its
corresponding symbol from the Pigpen
grid.
3. The result is the encrypted message.

Example: Plaintext: HELLO


Ciphertext: (Use the Pigpen Cipher
symbols to show how HELLO is encry
The Caesar Cipher: What is It?

• The Caesar Cipher is one of the simplest and most well-known


encryption techniques.

• Named after Julius Caesar, who used it to communicate securely


with his officials.

• It involves shifting each letter of the plaintext by a fixed number of


positions in the alphabet.
How the Caesar Cipher Works
To encrypt a message:
1. Choose a shift value (e.g., 3).
2. Replace each letter in the plaintext with the letter
that is 3 positions to the right.

Example:
Plaintext: HELLO
Shift: 3
Ciphertext: KHOOR

To decrypt, shift the letters back by the same number.


Example Implementation
Encrypting the message 'HELLO' with a shift of 3:

1. Start with the plaintext: H E L L O


2. Apply the shift: K H O O R

Ciphertext: KHOOR

Decryption reverses the process by shifting back by 3.


Limitations of the Caesar Cipher

The Caesar Cipher is easy to implement but also


easy to break.

It is vulnerable to frequency analysis and brute


force attacks.

Modern encryption methods are more complex


and secure, but the Caesar Cipher remains an
important historical example of encryption.
The Vigenère Cipher: What is It?
• The Vigenère Cipher is a method of encrypting text using a simple form of
polyalphabetic substitution.
• Invented by Blaise de Vigenère in the 16th century.
• Uses a keyword where each letter in the plaintext is shifted based on the
corresponding letter in the keyword.
How the Vigenère Cipher Works
Example: Plaintext: ATTACKATDAWN, Keyword: LEMONLEMONLE, Ciphertext:
LXFOPVEFRNHR
Steps to encrypt using Vigenère Cipher.
The Rail Fence Cipher: What is It?
•A form of transposition cipher that rearranges the characters
of the plaintext.
•Resembles a zigzag pattern on a fence.
•Simple to implement and used during the American Civil War.
How the Rail Fence Cipher Works
•Example with 3 rows: Plaintext: ATTACKATDAWN, Ciphertext: ATACTWAKTDAN
•Steps to encrypt using the Rail Fence Cipher.
Fun Facts About Encryption
• Did you know?

• - The Caesar Cipher was once considered


unbreakable!
• - Modern encryption algorithms can take years
to crack with current technology.
• - Encryption plays a vital role in securing online
transactions, from shopping to banking.
Conclusion
Data encryption is essential in protecting
information in our digital world.

While the Caesar Cipher is a simple example, it


demonstrates the basic principles of encryption.

Explore other encryption methods and deepen


your understanding to stay secure in an
increasingly connected world.
Credit:
1. Content Creation:
• Author: [Thaw Thaw Zin ]
2. References:
• Cambridge IGCSE and O level computer science second Edition
Caesar Cipher:
Caesar Cipher Diagram - Wikimedia Commons
Caesar Cipher Table - Wikimedia Commons

Vigenère Cipher:
Vigenère Cipher Square - Wikimedia Commons
Vigenère Cipher Process - Wikimedia Commons

Rail Fence Cipher:


Rail Fence Cipher Diagram - Wikimedia Commons
Rail Fence Cipher Example - Wikimedia Commons
Pigpen Cipher:
Pigpen Cipher Grid - Wikimedia Commons

You might also like