3. • Encryption is the process of encoding messages or
information in such a way that only authorized parties
can read it
• A process that converts original information, also called
plain text into a difficult-to-interpret form called
ciphertext
• Encryption does not of itself prevent interception, but
denies the message content to the interceptor
• Done by using an encryption algorithm, a formula used to
turn plain text into ciphertext.
What is Encryption?
5. Symmetric Key Encryption
• A secret key, is applied to the text of a message to change the
content in a particular way
• uses the same keys for both encryption of plaintext and
decryption of ciphertext.
• The keys may be identical or there may be a simple
transformation to go between the two keys.
• The keys, in practice, represent a shared secret between two
or more parties that can be used to maintain a private
information link
• both parties have access to the secret key which is one of the
main drawbacks of symmetric key encryption, in comparison
to asymmetric key encryption
6. Asymmetric Key Encryption
Known as public-private key or public key encryption
Uses key pairs for encrypting or decrypting data
Public key is used to encrypt the data and private key is used
to decrypt the data
Any message that is encrypted by using the private key can
only be decrypted by using the matching public key.
It has ability to share secret data without sharing the same
encryption key
8. Which one is better?
Although, symmetric encryption is fast, it is not as safe as
asymmetric encryption because someone could steal the key
and decode the messages. But because of its speed, it's
commonly used for e-commerce transactions
Asymmetric key encryption requires far more computation
to both encrypt and decrypt the content of the message. So,
the process takes longer. It has the ability to share the data
without sharing the same encryption key
9. Why use encryption?
• Authentication
• Protects personal data such as passwords.
• Privacy
• Provides for confidentiality of private information.
• Integrity
• Ensures that a document or file has not been altered.
• Accountability
• Prevents denial or plagiarism.
10. How prevalent is it?
According to InformationWeek Research:
Of 500 sites surveyed, two-thirds report using encryption to
protect company data.
Of 500 companies surveyed, 43% use encryption on both
stored and transmitted data. More than three out of five
companies encrypt due to the threat of outsiders intercepting
sensitive data.
Of 28% of sites surveyed, government regulation requires
encryption of stored and transmitted data.
For 38% of companies, the complexity of the technology is an
obstacle.