20. How Does It Work? (cont.) Asymmetric Encryption
21. How does it work? (cont.) Symmetric Encryption
22. Pros and Cons Pros Cons Keeps it confidential Needs to be maintained Very reliable Sometimes high costs $$ Encrypt as much as you want Compatibility? Time consuming for the computer
Encryption: The process of coding text into a secret code which is made up of a jumble of letters, numbers, and symbols that no one can read. Decryption: The process of decoding text from a secret code into regular readable text. A security method used to protect a computer from getting hacked by a third party. Encryption can protect: -Files on computers -Data being passed through the internet such as: ATM machines (because a PIN is passing through one machine to another, if it was not encrypted someone could extract it), E-Commerce (because when credit card information is given to the company that's making business, a hacker could easily steal the credit card number so they can steal money if the number isn't encrypted) In the diagram, it shows a Facebook password getting encrypted into coded text, and then decrypted into the regular readable text.
Because the majority of people these days use the Internet to communicate, purchase products etc. They want to protect their information from being viewed by an unwanted third party. No one wants their credit card information being revealed to others. Encryption prevents this personal information from getting stolen or read. If a hacker came across the information, he/she wouldn't understand the encrypted data. Without encryption, you have really no security. It's like writing a secret on a postcard to a friend. While it is being delivered, any mailman could just read it and know what you wrote.
Encryption allows the sender of the data to transform the data from plain text into ciphertext by using a key Ciphertext: it is the result of your text after it is encrypted. It is coded text made up of a mix of letters, numbers and symbols. Key: an encryption key is used to encrypt and decrypt text. It's like locking and unlocking a door. There are two different types of encryption: Asymmetric encryption (public key encryption): It uses two different keys, public and private to encrypt and decrypt data. Symmetric encryption: it uses two of the same keys, or a pair of keys to encrypt and decrypt data. We will talk about these two types of encryption throughout the next couple of slides. Both of these examples of encryption will be associated if Adrianna wants to send a message to me (Melissa)...
Use metre stick to point at diagram This is how Asymmetric Encryption works: I (Adrianna) wants to send a message to Melissa. I would encrypt the message with my public key. The message is now encrypted and is made up of ciphertext. (not all ciphertext has all letters, numbers and symbols.) The public key and the message get sent off to the recipient computer, in this case, which is Melissa's computer. Melissa receives the encrypted message and decrypts it with my private key. The message is returned into plain text and she is able to read it. As we said earlier, Asymmetric Encryption involves two different keys: a public key and a private key.
Use metre stick to point at diagram This is how Symmetric Encryption Works: Adrianna and I would decide on a specific key to use to encrypt and decrypt the message. In symmetric key encryption, each user (Adrianna and Melissa) already have that specific key. Adrianna composes the message then encrypts it with the key. She sends the encrypted message to me (Melissa). My (Melissa) computer receives the message and decrypts it with the key we both decided on. In this type of encryption, there is only ONE key.
PROS-Melissa Keeps it confidential: whoever is meant to read the data is the only person who can read it other than the sender. Because in asymmetric encryption, both the public and private keys are needed. In symmetric encryption, the same key is on each side and is not sent. Very reliable: It is unlikely for hackers to know the encryption code especially if the keys are fairly huge. Encrypt as much as you want: If a person wants to encrypt 100 pages worth of data they can, and if they want to encrypt one sentence of data they can as well. CONS-Adrianna Needs to be maintained: A person needs to maintain their user name and password and their encryption key. If they don't keep on using it, a hacker could come in unnoticed. High costs: The bigger the key, the higher the cost of the encryption. When a bigger key is used, the combination of encryption patterns are way larger. Compatibility: Sometimes the encryption doesn't correspond to the different programs and applications on the receiving computer. Time consuming: The more data that is encrypted, the longer it takes for the computer to encrypt and decrypt the data.
Used in the military and the government to protect secrets from intruders. In the military when they deliver a message, they encrypt it so the enemy won't find out what their plans are. Used in everyday life for: -online banking: to protect your credit card numbers/debit numbers etc. -E-commerce: to protect any personal information (i.e. Any payment numbers, addresses, postal codes, phone numbers, emails etc.) -student records: to protect your student information from being tampered with. -ATM machines: Protect PIN's from being stolen -Social networking: protect conversations and passwords from being stolen. -Businesses: Keeping information secret from rival companies