Download - Encryption
1
2
ENCRYPTION
PRESENTED BY
PLT. OFF. FIZA NADEEM
3
SEQUENCE
¨ INTRODUCTION
¨ HISTORY
¨ ENCRYPTION
¨ TYPES OF ENCRYPTION
¨ METHODS OF ENCRYPTION
¨ USES
¨ CONCLUSION
4
INTRODUCTION
¨ CRYPTOGRAPHY:
Science of encryption and decryption; converting between plaintext and ciphertext
¨ ENCRYPTION:
Conversion of data into a form, called a ciphertext
¨ DECRYPTION
To make encrypted information readable again
5
HISTORY
¨ Ancient Babylonian merchants used intaglio
¨ A piece of flat stone carved into images and writings
¨ Using this, they are producing what we today call ‘Digital Signature’
6
ENCRYPTION
¨ Process of transforming information
¨ Using cipher (algorithm)
¨ Unreadable to everyone except the one having key
7
8
TYPES OF ENCRYPTION
1. MANUAL ENCRYPTION:¨ Use of encryption software
¨ User’s participation
¨ Great for PCs
2. TRANSPARENT ENCRYPTION:¨ Most secure type of encryption
¨ Encrypts everything on computer
9
TYPES OF ENCRYPTION…(cont’d)
3. SYMMETRIC ENCRYPTION:¨ Most simplest type
¨ Code up yourself
¨ Only one key needed
¨ Safe method needed for transmission of key
10
TYPES OF ENCRYPTION…(cont’d)
11
TYPES OF ENCRYPTION…(cont’d)
4. ASYMMETRIC ENCRYPTION:
¨ Done electronically
¨ Public key is posted for the public to encrypt
¨ Decrpytion done only by private key
12
TYPES OF ENCRYPTION…(cont’d)
13
METHODS OF ENCRYPTION
¨ Consists of two main categories
¨ Stream Encryption: Clear text encrypted character by character
¨ Block Cipher Encryption: Clear text encrypted block by block
14
USES OF ENCRYPTION
¨ Protect information on your computer.
¨ Protect information in transit
¨ Wireless phones
15
USES OF ENCRYPTION … (cont’d)
¨ Confidentiality of medical, personal and transaction records
¨ Email program
¨ Digital signature
16
CONCLUSION
¨ Contrary to what most people think, encryption is not a new thing
¨ Encryption is being commonly used to facilitate secret communication
¨ Encryption is used to protect data at rest and at transit
17
THANK YOU!
18
Q & A