SlideShare ist ein Scribd-Unternehmen logo
1 von 11
What is Encryption?
• Encryption is the process of encoding messages or
information in such a way that only authorized parties
can read it
• A process that converts original information, also called
plain text into a difficult-to-interpret form called
ciphertext
• Encryption does not of itself prevent interception, but
denies the message content to the interceptor
• Done by using an encryption algorithm, a formula used to
turn plain text into ciphertext.
What is Encryption?
Types of Encryption:
-Symmetric Key Encryption
-Asymmetric Key Encryption
Symmetric Key Encryption
• A secret key, is applied to the text of a message to change the
content in a particular way
• uses the same keys for both encryption of plaintext and
decryption of ciphertext.
• The keys may be identical or there may be a simple
transformation to go between the two keys.
• The keys, in practice, represent a shared secret between two
or more parties that can be used to maintain a private
information link
• both parties have access to the secret key which is one of the
main drawbacks of symmetric key encryption, in comparison
to asymmetric key encryption
Asymmetric Key Encryption
 Known as public-private key or public key encryption
 Uses key pairs for encrypting or decrypting data
 Public key is used to encrypt the data and private key is used
to decrypt the data
 Any message that is encrypted by using the private key can
only be decrypted by using the matching public key.
 It has ability to share secret data without sharing the same
encryption key
Asymmetric Key Encryption
Which one is better?
 Although, symmetric encryption is fast, it is not as safe as
asymmetric encryption because someone could steal the key
and decode the messages. But because of its speed, it's
commonly used for e-commerce transactions
 Asymmetric key encryption requires far more computation
to both encrypt and decrypt the content of the message. So,
the process takes longer. It has the ability to share the data
without sharing the same encryption key
Why use encryption?
• Authentication
• Protects personal data such as passwords.
• Privacy
• Provides for confidentiality of private information.
• Integrity
• Ensures that a document or file has not been altered.
• Accountability
• Prevents denial or plagiarism.
How prevalent is it?
 According to InformationWeek Research:
 Of 500 sites surveyed, two-thirds report using encryption to
protect company data.
 Of 500 companies surveyed, 43% use encryption on both
stored and transmitted data. More than three out of five
companies encrypt due to the threat of outsiders intercepting
sensitive data.
 Of 28% of sites surveyed, government regulation requires
encryption of stored and transmitted data.
 For 38% of companies, the complexity of the technology is an
obstacle.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 

Was ist angesagt? (20)

Encryption
EncryptionEncryption
Encryption
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Encryption
EncryptionEncryption
Encryption
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Web Security
Web SecurityWeb Security
Web Security
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Email security
Email securityEmail security
Email security
 

Andere mochten auch

newmarketingplan_04-14-WEB
newmarketingplan_04-14-WEBnewmarketingplan_04-14-WEB
newmarketingplan_04-14-WEB
Susan Horak
 
CVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravuCVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravu
zugravu adrian
 
Medcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory ListMedcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory List
medcravepublisher
 
Buyer'sGuideIssuu
Buyer'sGuideIssuuBuyer'sGuideIssuu
Buyer'sGuideIssuu
Susan Horak
 
Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011
Tareq Alkh
 
Financial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual FrameworkFinancial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual Framework
Atif Ahmed
 
Impact of Risk Free and Risky Asset on Portfolio Return
Impact of Risk Free and  Risky Asset on Portfolio ReturnImpact of Risk Free and  Risky Asset on Portfolio Return
Impact of Risk Free and Risky Asset on Portfolio Return
Atif Ahmed
 
Estres laboral en la industria colombiana
Estres laboral en la industria colombianaEstres laboral en la industria colombiana
Estres laboral en la industria colombiana
Jeisson Botina
 

Andere mochten auch (20)

newmarketingplan_04-14-WEB
newmarketingplan_04-14-WEBnewmarketingplan_04-14-WEB
newmarketingplan_04-14-WEB
 
González valentín presentación_competic2
González valentín presentación_competic2González valentín presentación_competic2
González valentín presentación_competic2
 
CVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravuCVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravu
 
González valentín catàleg_competic2
González valentín catàleg_competic2González valentín catàleg_competic2
González valentín catàleg_competic2
 
Medcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory ListMedcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory List
 
White Paper Organizational Design
White Paper Organizational DesignWhite Paper Organizational Design
White Paper Organizational Design
 
Andrey Chebotarev, Head of UX Design в AltexSoft
Andrey Chebotarev, Head of UX Design в AltexSoftAndrey Chebotarev, Head of UX Design в AltexSoft
Andrey Chebotarev, Head of UX Design в AltexSoft
 
Solución del modelo de examen
Solución del modelo de examenSolución del modelo de examen
Solución del modelo de examen
 
Buyer'sGuideIssuu
Buyer'sGuideIssuuBuyer'sGuideIssuu
Buyer'sGuideIssuu
 
Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011
 
Financial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual FrameworkFinancial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual Framework
 
Impact of Risk Free and Risky Asset on Portfolio Return
Impact of Risk Free and  Risky Asset on Portfolio ReturnImpact of Risk Free and  Risky Asset on Portfolio Return
Impact of Risk Free and Risky Asset on Portfolio Return
 
Praktek
PraktekPraktek
Praktek
 
Estres laboral en la industria colombiana
Estres laboral en la industria colombianaEstres laboral en la industria colombiana
Estres laboral en la industria colombiana
 
My Invoice Finance
My Invoice FinanceMy Invoice Finance
My Invoice Finance
 
Aplikasi Gallery Pengetahuan
Aplikasi Gallery PengetahuanAplikasi Gallery Pengetahuan
Aplikasi Gallery Pengetahuan
 
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
 
Internet
InternetInternet
Internet
 
Metodos computarizados para resolver ecuaciones diferenciales
Metodos computarizados para resolver ecuaciones diferencialesMetodos computarizados para resolver ecuaciones diferenciales
Metodos computarizados para resolver ecuaciones diferenciales
 
12 najpiękniejszych planerów wg Przedsiebiorcza.com
12 najpiękniejszych planerów wg Przedsiebiorcza.com12 najpiękniejszych planerów wg Przedsiebiorcza.com
12 najpiękniejszych planerów wg Przedsiebiorcza.com
 

Ähnlich wie Encryption ppt

Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 

Ähnlich wie Encryption ppt (20)

Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Encryption
Encryption Encryption
Encryption
 
Security
SecuritySecurity
Security
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Cryptography
CryptographyCryptography
Cryptography
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Encryption ppt

  • 1.
  • 3. • Encryption is the process of encoding messages or information in such a way that only authorized parties can read it • A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext • Encryption does not of itself prevent interception, but denies the message content to the interceptor • Done by using an encryption algorithm, a formula used to turn plain text into ciphertext. What is Encryption?
  • 4. Types of Encryption: -Symmetric Key Encryption -Asymmetric Key Encryption
  • 5. Symmetric Key Encryption • A secret key, is applied to the text of a message to change the content in a particular way • uses the same keys for both encryption of plaintext and decryption of ciphertext. • The keys may be identical or there may be a simple transformation to go between the two keys. • The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link • both parties have access to the secret key which is one of the main drawbacks of symmetric key encryption, in comparison to asymmetric key encryption
  • 6. Asymmetric Key Encryption  Known as public-private key or public key encryption  Uses key pairs for encrypting or decrypting data  Public key is used to encrypt the data and private key is used to decrypt the data  Any message that is encrypted by using the private key can only be decrypted by using the matching public key.  It has ability to share secret data without sharing the same encryption key
  • 8. Which one is better?  Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could steal the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions  Asymmetric key encryption requires far more computation to both encrypt and decrypt the content of the message. So, the process takes longer. It has the ability to share the data without sharing the same encryption key
  • 9. Why use encryption? • Authentication • Protects personal data such as passwords. • Privacy • Provides for confidentiality of private information. • Integrity • Ensures that a document or file has not been altered. • Accountability • Prevents denial or plagiarism.
  • 10. How prevalent is it?  According to InformationWeek Research:  Of 500 sites surveyed, two-thirds report using encryption to protect company data.  Of 500 companies surveyed, 43% use encryption on both stored and transmitted data. More than three out of five companies encrypt due to the threat of outsiders intercepting sensitive data.  Of 28% of sites surveyed, government regulation requires encryption of stored and transmitted data.  For 38% of companies, the complexity of the technology is an obstacle.