Vous êtes sur la page 1sur 22

Encryption

By: SHUBHAM GUPTA (1502910152)


Table of Contents
We will be talking about...
What is Encryption?
Why Do We Use Encryption?
How Does It Work? (x3)
Pros and Cons Real Life
Examples
It’s 3am…
Do you know where your laptops are?

Full Disk Encryption protects against lost devices


What is Encryption?
Encryption: The process of coding text
Decryption: The process of decoding text
Decryption is the opposite of encryption

A security method used to protect data


Files on computers
Data being passed through the Internet
ATM machines E-Commerce
Facebook password

Facebo En c r y Facebo
ok Pass p t io
gbdfcppl@
ok Pass
word n D e c r y p tqi bo tnt x p s e word
Folder encryption

Think of folder encryption as a safe


deposit box
Full Disk Encryption

Think of Full Disk Encryption like a


bank vault
Why Do We Use Encryption?
To secure important information e.g. : Health
records
Credit card information Student records
Etc.
Prevents information from getting stolen or read
Without encryption, there is no reliable security
Would you trust…

this guy with your files?

File and Folder Encryption protects specific data


How Does It Work?
Encryption allows the sender to transform data from
plain text into ciphertext by using a key

Ciphertext: coded text


Key: what is used to encrypt and decrypt text

Two different types of encryption:


Asymmetric encryption (Public key encryption)
Symmetric encryption
Data encryption
File encryption

Think of file encryption as a secret code

A simple code:
A=0
B=1
C=2
D=3
Etc

A message:
7 4 11 11 14
22 14 17 11 3
*plaintext
*encryption algorithm
*public and private key
*cipher text
* decryption algorithm

A public key encryption


scheme has six
ingredients
 In symmetric
(Single key):
The encryption
and decryption keys
are the same.

Types of data encryption


.

 Symmetric key
encryption is also
known as private
encryption, because it
uses the same key and
same cryptographic
algorithm to encrypt
and decrypt data.
A symmetric encryption scheme
has five ingredients


Plaintext
* Encryption Algorithm
* Secret key
* Cipher Text
* Decription
 In asymmetric
(two keys):
The encryption
and decryption
keys are
different.

.
.
Pros and Cons
Pros Cons
Keeps it confidential Needs to be maintained

Very reliable Sometimes high costs $$

Encrypt as much as you Compatibility?


want

Time consuming for the


computer
Industry Standard
Encryption

–AES 256
–FIPS certified
–RSA
–Blowfish
–Twofish
Real Life Examples
Used in the military and the government

Now used in everyday life:


Online banking E-commerce
Student records, health records, tax records etc. ATM
machines
Social networking (emails, texts, instant messengers)
Businesses
THANK YOU

Vous aimerez peut-être aussi