Information Security 05 Encryption
Information Security 05 Encryption
Arfan Shahzad
{ [email protected] }
Course Outline
Encryption
series of characters or bits injected into the algorithm along with the
• Key tells the algorithm how to transform the plaintext into ciphertext.
Encryption cont…
Key Terms
• Kerckhoffs's principle states that “only secrecy of the key provides
security”.
• The key locks and unlocks the algorithm, allowing the encryption or
decryption process to function.
communication.
Encryption cont…
Key Terms
• Symmetric Encryption Algorithms types: 8. RC6
than DES.
• It uses the concept of public and private key pairs, with encryption
and decryption.
Encryption cont…
Key Terms
• Diffie-Hellman (DH): Although not strictly an encryption algorithm,
encryption systems.
insecure channel.
Encryption cont…
Key Terms
• Public and Private Keys: Now we understand more about the function of
keys in the encryption process, we can look at public and private keys.
• An asymmetric algorithm uses two keys: a public key and a private key.
• The public key can be sent to other people, while the private key is only
private message for them, while the recipient can only read the
private key.
Encryption cont…
Key Terms
Encryption cont…
Key Terms
• Public and private keys also play an essential role in digital
signatures, whereby a sender can sign their message with their
private encryption key.
• Those with the public key can then verify the message, safe in the
knowledge that the original message came from the sender's private
key.
Encryption cont…
Key Terms
• Public and private keys also play an essential role in digital signatures, whereby a
sender can sign their message with their private encryption key.
• Those with the public key can then verify the message, safe in the knowledge that
the original message came from the sender's private key.
• A key pair is the mathematically linked public and private key generated by an
encryption algorithm.
Encryption cont…
Key Terms
• HTTPS: Hyper Text Transfer Protocol Secure (HTTPS) is a now widely
destroys once you leave the HTTPS site (closing the connection and
• Since 2018 the majority of sites online began offering HTTPS connections
• Well, this means that the private key used for encoding and decoding
your messages never leaves your device, in turn ensuring that no one
but you can send messages using your name (digital signature).