0% found this document useful (0 votes)
3 views

Data Encryption (1)

Uploaded by

tala.rateb.learn
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Data Encryption (1)

Uploaded by

tala.rateb.learn
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Data

Encryption
Dr Name : Ala Abu-Samaha
Student Name:Tala Abu Hwiej
AGENDA

1) What does data mean?


2) Data Encryption
3) Symmetric and Asymmetric Encryption
4) Two key trade-offs between symmetric and
asymmetric encryption
5) Stream encryption and Block encryption
What does data mean?

• A representation of facts, concepts, or instructions in a formal


manner suitable for communication, interpretation, or processing
by human beings or by computers
• They have evolved into priceless assets that drive innovation,
decision-making, and progress in virtually all industries and
sectors
• Due to the importance of data, it must be protected, which is why
we use encryption
Data Encryption
• Data Encryption is a method of converting sensitive information from
plain text to ciphertext with the help of public/private keys.
• Data Decryption: The process of converting back to plain text is
referred to as decryption
Data Encryption
Data Encryption

• A cryptosystem involves a set of rules for how to encrypt


the plaintext and decrypt the ciphertext. The encryption
and decryption rules, called algorithms, often use a device
called a key, denoted by K.
• The resulting ciphertext depends on the original plaintext
message, the algorithm, and the key value.
• We write this dependence as C = E(K, P).
Symmetric and Asymmetric Encryption

• The two most common encryption methods are symmetric and


asymmetric encryption. The names refer to whether or not the
same key is used for encryption and decryption.
1) Symmetric encryption
In a symmetric way, the encryption and decryption keys are the same,
so P = D(K, E(K, P)), meaning that the same key, K, is used both to encrypt
a message and later to decrypt it. This form is called conventional key or
single-key or secret key encryption because D and E are mirror-image
processes
Symmetric and Asymmetric Encryption

Figure2 symmetric way


Symmetric algorithms

• A variety of encryption algorithms are available, each intended for a specific use.
The most well-known symmetric encryption algorithms are as follows:
1) Data Encryption Standards (DES): DES is a low-level encryption block cipher
algorithm that converts plain text into blocks of 64 bits and converts them to
ciphertext using keys of 48 bits
2) Triple DES: Triple DES runs DES encryption three different times by encrypting,
decrypting, and then encrypting data again
3) Advanced Encryption Standard (AES): AES is often referred to as the gold
standard for data encryption and is used worldwide as the U.S. government
standard
Asymmetric Encryption

• Encryption algorithms of this form are called asymmetric or public key


because converting C back to P involves a series of steps and two key
that are different from the steps of E .
• encryption and decryption keys come in pairs. Then, a decryption key,
KD, inverts the encryption of key KE , so that P = D(KD, E(KE ,P)).
Asymmetric Encryption

• A variety of encryption algorithms are available, each intended for a


specific use. The most well-known Asymmetric encryption algorithms
are as follows:
1) RSA: RSA, named after computer scientists Ron Rivest, Adi Shamir,
and Leonard Adleman, is a popular algorithm used to encrypt data
with a public key and decrypt with a private key for secure data
transmission [4].
2) Public key infrastructure (PKI): PKI is a way of governing encryption
keys through the issuance and management of digital certificates [4].
Two key trade-offs between symmetric and
asymmetric encryption
• There are two key trade-offs between symmetric and asymmetric
encryption: speed and security.
• Symmetric encryption is quicker because the keys used in
symmetric cryptography are the same for encryption and
decryption unlike A symmetric.
• Asymmetric encryption is slow but more secure because it
employs two distinct keys: a public key that is only used to
encrypt communications, making it safe for anybody to possess,
and a private key that is never disclosed. Because the private
key is never shared, it ensures that only the intended receiver
may decrypt encoded communications and generate a tamper-
proof digital signature
Stream encryption and Block encryption

• Characterizing encryption methods also take into account relates to


the way to move the data to be concealed.
1) stream encryption that encrypts 1 bit or byte of plaintext at a time
the data stream is encrypted independently
Stream encryption and Block encryption

2. block encryption that encrypts a group of plaintext symbols as a


single block. A block cipher algorithm performs its work on a quantity
of plaintext data all at once.
REFERENCES

1) J. Vaughan, “data,” Data Management, Jul. 31, 2019.


https://www.techtarget.com/searchdatamanagement/definition/data
2) C. P. Pfleeger, S. L. Pfleeger, and J. Margulies, Security in Computing: 5th Edition, 5th ed. 2018.
[Online]. Available: https://dl.acm.org/citation.cfm?id=2756777
3) “What is Data Encryption?,” www.kaspersky.com, Jun. 09, 2023.
https://www.kaspersky.com/resource-center/definitions/encryption
4) “What is encryption? Data encryption defined | IBM.” https://www.ibm.com/topics/encryption
5) R. Yackel, “When to Use Symmetric Encryption vs. Asymmetric Encryption,” Keyfactor, Sep. 12,
2023. https://www.keyfactor.com/blog/symmetric-vs-asymmetric-encryption/
Thank you

You might also like