SlideShare ist ein Scribd-Unternehmen logo
1 von 14
ENCRYPTION DECRYPTION OF
EMAIL
By shashank singhal
Under supervision of Dr. Krishna Asawa
What is encryption?
 A process that converts original information, also
called plain text into a difficult-to-interpret form
called ciphertext.
 Done by using an encryption algorithm, a formula
used to turn plain text into ciphertext.
 Two types: Asymmetric and Symmetric
Asymmetric Encryption
Symmetric Encryption
Which one is better?
 Although, symmetric encryption is fast, it is not as
safe as asymmetric encryption because someone
could “steal” the key and decode the messages.
But because of its speed, it's commonly used for e-
commerce transactions.
 Asymmetric encryption is more complex--and more
secure. Asymmetric encryption's added safety
comes at a price: More computation is required, so
the process takes longer.
Who’s using encryption?
 If you use a computer and the internet, you’re
using encryption!
 Enables all organizations regardless of their size, to
be both user-and-IT friendly.
Why use encryption?
 Authentication
 Protects personal data such as passwords.
 Privacy
 Provides for confidentiality of private information.
 Accountability
 Prevents denial or plagiarism.
 Integrity
 Ensures that a document or file has not been altered.
How do you manage encryption?
 Make sure the encryption system has a complete
key management application.
 This will help manage and protect the data and keys,
and help you safely match encrypted data with the
right key.
Examples of Encryption
 Web browser encryption
 Email encryption
 Hard drive encryption
 Operating system protection
A few vendors and their product
coverage
 Blackberry
 System, software, hardware, and service.
 Global Technologies Group, Inc. (GTGI)
 Software and hardware.
 Hewlett-Packard Company
 System, software, hardware, and service.
 Intellect Security Ltd.
 Software
How prevalent is it?
 According to InformationWeek Research:
 Of 500 sites surveyed, two-thirds report using
encryption to protect company data.
 Of 500 companies surveyed, 43% use encryption on
both stored and transmitted data. More than three out
of five companies encrypt due to the threat of
outsiders intercepting sensitive data.
Continued…
 Of 28% of sites surveyed, government regulation
requires encryption of stored and transmitted data.
 For 38% of companies, the complexity of the
technology is an obstacle.
 Some businesses aren’t able to use the technology
because of the lack of skilled IT personnel and budget
limitations.
Want more???
 More on what encryption is…
 http://cplus.about.com/od/introductiontoprogramming/p/encryption.htm
 http://www.pcworld.com/article/id,15230/article.html
 http://www.encyclopedia.com/doc/1G1-144388099.html
 http://www.informationweek.com/news/showArticle.jhtml?articleID=650
7540
 http://security.homeoffice.gov.uk/ripa/encryption/types-of-encryption/
 http://www.itworld.com/nl/unix_sec/01242002/
 http://www.pcmag.com/encyclopedia_term/0,2542,t=encryption+algorit
hm&i=42595,00.asp
 More on vendors and more detailed products…
 http://securitypark.bitpipe.com/olist/Data-Encryption.html
Questions???

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Data security
Data securityData security
Data security
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Encryption 2021
Encryption 2021Encryption 2021
Encryption 2021
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it business
 
Data security
Data securityData security
Data security
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
20181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 36520181115 O365 connect protecting your data in office 365
20181115 O365 connect protecting your data in office 365
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Data Security
Data SecurityData Security
Data Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
20181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 36520181110 sps leicester connect protecting your data in office 365
20181110 sps leicester connect protecting your data in office 365
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Data security
Data securityData security
Data security
 
Book
BookBook
Book
 

Andere mochten auch

Ad Libitum 05
Ad Libitum 05Ad Libitum 05
Ad Libitum 05
soumitroy
 
Contact, Colonization, And Settlement In The
Contact, Colonization, And Settlement In TheContact, Colonization, And Settlement In The
Contact, Colonization, And Settlement In The
Philsfan
 
Conjoint
ConjointConjoint
Conjoint
putra69
 
Windows Phone 8 Fundamental
Windows Phone 8 FundamentalWindows Phone 8 Fundamental
Windows Phone 8 Fundamental
Nguyên Phạm
 
XMetaL Dialog Odds & Ends
XMetaL Dialog Odds & EndsXMetaL Dialog Odds & Ends
XMetaL Dialog Odds & Ends
XMetaL
 
List Of Indictable Offences
List Of Indictable OffencesList Of Indictable Offences
List Of Indictable Offences
kavanagh_n
 

Andere mochten auch (20)

Ad Libitum 05
Ad Libitum 05Ad Libitum 05
Ad Libitum 05
 
Contact, Colonization, And Settlement In The
Contact, Colonization, And Settlement In TheContact, Colonization, And Settlement In The
Contact, Colonization, And Settlement In The
 
Email bagging
Email baggingEmail bagging
Email bagging
 
Cash flow
Cash flowCash flow
Cash flow
 
Conjoint
ConjointConjoint
Conjoint
 
Packet Tracer WEB & Email
Packet Tracer WEB & Email Packet Tracer WEB & Email
Packet Tracer WEB & Email
 
Brimful of Asha
Brimful of AshaBrimful of Asha
Brimful of Asha
 
Windows Phone 8 Fundamental
Windows Phone 8 FundamentalWindows Phone 8 Fundamental
Windows Phone 8 Fundamental
 
Conveying Verbal Messages
Conveying Verbal MessagesConveying Verbal Messages
Conveying Verbal Messages
 
Ten Poisonous Fruit
Ten Poisonous FruitTen Poisonous Fruit
Ten Poisonous Fruit
 
Cogitate Design Portfolio
Cogitate Design PortfolioCogitate Design Portfolio
Cogitate Design Portfolio
 
Fertilizer mixtures - Europe
Fertilizer mixtures - EuropeFertilizer mixtures - Europe
Fertilizer mixtures - Europe
 
XMetaL Dialog Odds & Ends
XMetaL Dialog Odds & EndsXMetaL Dialog Odds & Ends
XMetaL Dialog Odds & Ends
 
List Of Indictable Offences
List Of Indictable OffencesList Of Indictable Offences
List Of Indictable Offences
 
The Pitching Manual - How to Pitch?
The Pitching Manual - How to Pitch? The Pitching Manual - How to Pitch?
The Pitching Manual - How to Pitch?
 
Commissionaire Arrangement
Commissionaire ArrangementCommissionaire Arrangement
Commissionaire Arrangement
 
Aula sob email
Aula sob emailAula sob email
Aula sob email
 
Eval,coeval.
Eval,coeval.Eval,coeval.
Eval,coeval.
 
A disproof of the Riemann hypothesis
A disproof of the Riemann hypothesisA disproof of the Riemann hypothesis
A disproof of the Riemann hypothesis
 
Economides -The Greek and EU crisis
Economides -The Greek and EU crisis Economides -The Greek and EU crisis
Economides -The Greek and EU crisis
 

Ähnlich wie Encryption-Decryption of Email

Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Editor IJMTER
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
SantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
AbbyWhyte974
 

Ähnlich wie Encryption-Decryption of Email (20)

Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
N45028390
N45028390N45028390
N45028390
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
seminar Cryptography and network ppt.pptx
seminar Cryptography and network ppt.pptxseminar Cryptography and network ppt.pptx
seminar Cryptography and network ppt.pptx
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 

Kürzlich hochgeladen

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Encryption-Decryption of Email

  • 1. ENCRYPTION DECRYPTION OF EMAIL By shashank singhal Under supervision of Dr. Krishna Asawa
  • 2. What is encryption?  A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext.  Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.  Two types: Asymmetric and Symmetric
  • 5. Which one is better?  Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e- commerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 6. Who’s using encryption?  If you use a computer and the internet, you’re using encryption!  Enables all organizations regardless of their size, to be both user-and-IT friendly.
  • 7. Why use encryption?  Authentication  Protects personal data such as passwords.  Privacy  Provides for confidentiality of private information.  Accountability  Prevents denial or plagiarism.  Integrity  Ensures that a document or file has not been altered.
  • 8. How do you manage encryption?  Make sure the encryption system has a complete key management application.  This will help manage and protect the data and keys, and help you safely match encrypted data with the right key.
  • 9. Examples of Encryption  Web browser encryption  Email encryption  Hard drive encryption  Operating system protection
  • 10. A few vendors and their product coverage  Blackberry  System, software, hardware, and service.  Global Technologies Group, Inc. (GTGI)  Software and hardware.  Hewlett-Packard Company  System, software, hardware, and service.  Intellect Security Ltd.  Software
  • 11. How prevalent is it?  According to InformationWeek Research:  Of 500 sites surveyed, two-thirds report using encryption to protect company data.  Of 500 companies surveyed, 43% use encryption on both stored and transmitted data. More than three out of five companies encrypt due to the threat of outsiders intercepting sensitive data. Continued…
  • 12.  Of 28% of sites surveyed, government regulation requires encryption of stored and transmitted data.  For 38% of companies, the complexity of the technology is an obstacle.  Some businesses aren’t able to use the technology because of the lack of skilled IT personnel and budget limitations.
  • 13. Want more???  More on what encryption is…  http://cplus.about.com/od/introductiontoprogramming/p/encryption.htm  http://www.pcworld.com/article/id,15230/article.html  http://www.encyclopedia.com/doc/1G1-144388099.html  http://www.informationweek.com/news/showArticle.jhtml?articleID=650 7540  http://security.homeoffice.gov.uk/ripa/encryption/types-of-encryption/  http://www.itworld.com/nl/unix_sec/01242002/  http://www.pcmag.com/encyclopedia_term/0,2542,t=encryption+algorit hm&i=42595,00.asp  More on vendors and more detailed products…  http://securitypark.bitpipe.com/olist/Data-Encryption.html