1 / 13

Data Encryption

Data Encryption. What is Encryption?. - The translation of data into a secret code. - To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. - Unencrypted data is called plain text. - encrypted data is referred to as cipher text.

flint
Télécharger la présentation

Data Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Encryption

  2. What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it - Unencrypted data is called plain text - encrypted data is referred to as cipher text

  3. Plain text Cipher text Dear students, My phone no. Is 24750331 Ghdu vwxghqwv, Pb skrqh qr. Lv 57083664 Encrypt Decrypt Dear students, My phone no. Is 24750331 Plain text

  4. Activity Encrypted text: Fgct encuu yg ctg iqkpi vq vcnm cdqwv fcvc gpetarvkqp Original text:

  5. Common algorithms of Encryption Symmetric Encryption Asymmetric Encryption

  6. Symmetric Encryption A type of encryption where the same key is used to encrypt and decrypt the message

  7. Symmetric Encryption (Example) Plain text 1 0 1 1 0 1 1 0 Same Key Encrypt Key XOR 1 1 0 1 1 1 1 0 Cipher text 0 1 1 0 1 0 0 1 Key XOR 1 1 0 1 1 1 1 0 Decrypt Plain text 1 0 1 1 0 1 1 0

  8. Asymmetric Encryption Asymmetric encryption (also called public-key encryption) involves a pair of keys - a public and a private key. The public key is published in a public directory and the corresponding private key is kept secret.

  9. Asymmetric Encryption The sender of the data encrypts the data with the public key of the receiver The data can be decrypted only with the private key of the receiver

  10. Asymmetric Encryption Plain Text Cipher Text Plain Text

  11. How to use two different keys? One key is the inverse of the other: Public key = 3, Private key = 1/3 Plain text = 4 Encryption: cipher text = public key * plain text = 3 * 4 = 12 Decryption: plain text = private key * cipher text = 1/3 * 12 = 4

  12. Discussion What are the uses of encryption?

  13. Activity Construct a simple algorithm of encryption.

More Related