encryption

18
1

Upload: fiza-arslan

Post on 15-Dec-2014

778 views

Category:

Technology


5 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Encryption

1

Page 2: Encryption

2

ENCRYPTION

PRESENTED BY

PLT. OFF. FIZA NADEEM

Page 3: Encryption

3

SEQUENCE

¨ INTRODUCTION

¨ HISTORY

¨ ENCRYPTION

¨ TYPES OF ENCRYPTION

¨ METHODS OF ENCRYPTION

¨ USES

¨ CONCLUSION

Page 4: Encryption

4

INTRODUCTION

¨ CRYPTOGRAPHY:

Science of encryption and decryption; converting between plaintext and ciphertext

¨ ENCRYPTION:

Conversion of data into a form, called a ciphertext

¨ DECRYPTION

To make encrypted information readable again

Page 5: Encryption

5

HISTORY

¨ Ancient Babylonian merchants used intaglio

¨ A piece of flat stone carved into images and writings

¨ Using this, they are producing what we today call ‘Digital Signature’

Page 6: Encryption

6

ENCRYPTION

¨ Process of transforming information

¨ Using cipher (algorithm)

¨ Unreadable to everyone except the one having key

Page 7: Encryption

7

Page 8: Encryption

8

TYPES OF ENCRYPTION

1. MANUAL ENCRYPTION:¨ Use of encryption software

¨ User’s participation

¨ Great for PCs

2. TRANSPARENT ENCRYPTION:¨ Most secure type of encryption

¨ Encrypts everything on computer

Page 9: Encryption

9

TYPES OF ENCRYPTION…(cont’d)

3. SYMMETRIC ENCRYPTION:¨ Most simplest type

¨ Code up yourself

¨ Only one key needed

¨ Safe method needed for transmission of key

Page 10: Encryption

10

TYPES OF ENCRYPTION…(cont’d)

Page 11: Encryption

11

TYPES OF ENCRYPTION…(cont’d)

4. ASYMMETRIC ENCRYPTION:

¨ Done electronically

¨ Public key is posted for the public to encrypt

¨ Decrpytion done only by private key

Page 12: Encryption

12

TYPES OF ENCRYPTION…(cont’d)

Page 13: Encryption

13

METHODS OF ENCRYPTION

¨ Consists of two main categories

¨ Stream Encryption: Clear text encrypted character by character

¨ Block Cipher Encryption: Clear text encrypted block by block

Page 14: Encryption

14

USES OF ENCRYPTION

¨ Protect information on your computer.

¨ Protect information in transit

¨ Wireless phones

Page 15: Encryption

15

USES OF ENCRYPTION … (cont’d)

¨ Confidentiality of medical, personal and transaction records

¨ Email program

¨ Digital signature

Page 16: Encryption

16

CONCLUSION

¨ Contrary to what most people think, encryption is not a new thing

¨ Encryption is being commonly used to facilitate secret communication

¨ Encryption is used to protect data at rest and at transit

Page 17: Encryption

17

THANK YOU!

Page 18: Encryption

18

Q & A