6
Most read
9
Most read
12
Most read
ENCRYPTION

Mrs. Vasanthi Muniasamy

1
SEQUENCE
INTRODUCTION

HISTORY
ENCRYPTION
TYPES OF ENCRYPTION
METHODS OF ENCRYPTION
USES

CONCLUSION

2
INTRODUCTION
CRYPTOGRAPHY:
Science of encryption and decryption; converting
between plaintext and ciphertext

ENCRYPTION:
Conversion of data into a form, called a ciphertext

DECRYPTION
To make encrypted information readable again

3
HISTORY
Ancient Babylonian merchants used intaglio

A piece of flat stone carved into images and
writings

Using this, they are producing what we today
call ‘Digital Signature’

4
ENCRYPTION
Process of transforming information

Using cipher (algorithm)

Unreadable to everyone except the one having
key

5
6
TYPES OF ENCRYPTION
1. MANUAL ENCRYPTION:
Use of encryption software
User’s participation
Great for PCs

2. TRANSPARENT ENCRYPTION:
Most secure type of encryption

Encrypts everything on computer

7
TYPES OF ENCRYPTION…(cont’d)
3. SYMMETRIC ENCRYPTION:
Most simplest type

Code up yourself

Only one key needed

Safe method needed for transmission of key

8
TYPES OF ENCRYPTION…(cont’d)

9
TYPES OF ENCRYPTION…(cont’d)
4. ASYMMETRIC ENCRYPTION:

Done electronically

Public key is posted for the public to encrypt

Decrpytion done only by private key

10
TYPES OF ENCRYPTION…(cont’d)

11
METHODS OF ENCRYPTION
Consists of two main categories

Stream Encryption: Clear text encrypted
character by character

Block Cipher Encryption: Clear text encrypted
block by block

12
USES OF ENCRYPTION
Protect information on your computer.

Protect information in transit

Wireless phones

13
USES OF ENCRYPTION … (cont’d)
Confidentiality of medical, personal and
transaction records

Email program

Digital signature

14
CONCLUSION
Contrary to what most people think, encryption
is not a new thing

Encryption is being commonly used to facilitate
secret communication

Encryption is used to protect data at rest and at
transit

15
16

THANK YOU!

More Related Content

PPTX
Cryptography
PPTX
Advanced cryptography and implementation
PPTX
Symmetric and asymmetric key
PPTX
Cryptography
PPT
Fundamentals of cryptography
PPT
Cryptography Intro
PPTX
RSA ALGORITHM
Cryptography
Advanced cryptography and implementation
Symmetric and asymmetric key
Cryptography
Fundamentals of cryptography
Cryptography Intro
RSA ALGORITHM

What's hot (20)

PPTX
Intro to modern cryptography
PPTX
Network security and cryptography
PPTX
Security Mechanisms
PPTX
Cryptography
PDF
Computer Security Lecture 3: Classical Encryption Techniques 2
PPTX
PPTX
Cryptography.ppt
PPT
Encryption technology
PPTX
Cryptography
PPTX
Data Encryption Standard (DES)
PPTX
Image Steganography
PPTX
Cryptography
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPT
Message Authentication
PPTX
Overview of cryptography
PPTX
Crypto graphy
PPT
13 asymmetric key cryptography
ODP
Email security
Intro to modern cryptography
Network security and cryptography
Security Mechanisms
Cryptography
Computer Security Lecture 3: Classical Encryption Techniques 2
Cryptography.ppt
Encryption technology
Cryptography
Data Encryption Standard (DES)
Image Steganography
Cryptography
Information Security Cryptography ( L02- Types Cryptography)
Message Authentication
Overview of cryptography
Crypto graphy
13 asymmetric key cryptography
Email security
Ad

Viewers also liked (19)

PPTX
Mis 201 (presentation)
PPTX
Cryptography
PPTX
Cryptography
PPT
Cryptography its history application and beyond
PPT
Cryptography - A Brief History
PDF
A Brief History of Cryptography
PPT
History of cryptography
PPT
Bluetooth Technology
PPT
WiFi Technology & IEEE
PPT
Networkingconcepts
PPTX
Osi reference model
PPTX
Lecture #1 - Introduction to Information System
PPTX
Computer Networking
PPT
Cryptography
PPTX
cryptography
PPTX
Lecture #1 - Introduction to Information System
PPTX
Cryptography
PPTX
Cryptography.ppt
PPT
Old english summary
Mis 201 (presentation)
Cryptography
Cryptography
Cryptography its history application and beyond
Cryptography - A Brief History
A Brief History of Cryptography
History of cryptography
Bluetooth Technology
WiFi Technology & IEEE
Networkingconcepts
Osi reference model
Lecture #1 - Introduction to Information System
Computer Networking
Cryptography
cryptography
Lecture #1 - Introduction to Information System
Cryptography
Cryptography.ppt
Old english summary
Ad

Similar to Encryption (20)

PPTX
Encryption
PPTX
Introduction to Cryptography
PDF
DataMotion-IG1-TheEvolutionofEncryption
PPTX
Cryptography.pptxhis document provides an overview of cryptography. It define...
PPTX
cryptography in computer and its module and application
PPTX
Cryptography
PPT
Securityand encryption
PDF
Cryptology - The practice and study of hiding information
PDF
PPTX
Cryptography and Network Security
PPTX
PPTX
Cryptography
PPTX
Cryptography, a science of secure writing
PDF
Week11
PDF
Week11
PPTX
Introduction to Cryptography for btech cse
PPT
Cryptography
PPTX
Cryptography and encryption
PPTX
CSE CRYPTOGRAPHY ppt - Copy.pptx
PDF
crypto-105058445051058480051448005540405
Encryption
Introduction to Cryptography
DataMotion-IG1-TheEvolutionofEncryption
Cryptography.pptxhis document provides an overview of cryptography. It define...
cryptography in computer and its module and application
Cryptography
Securityand encryption
Cryptology - The practice and study of hiding information
Cryptography and Network Security
Cryptography
Cryptography, a science of secure writing
Week11
Week11
Introduction to Cryptography for btech cse
Cryptography
Cryptography and encryption
CSE CRYPTOGRAPHY ppt - Copy.pptx
crypto-105058445051058480051448005540405

More from vasanthimuniasamy (16)

PPTX
Wireless Networking
PPT
Wi MAX Technology
PPT
WAP Technology
PPTX
I - Mode Technology
PPT
Cellular Communication
PDF
Computer Network PDF - Course Material 2013
PDF
Computer Wireless Network Pdf - course material 2013
PPT
Smartcard lecture #5
PPT
Lecture #5 Data Communication and Network
PPT
Database Management System Lecture #4
PPTX
Watermarking lecture #4
PPTX
Virus Lecture #3
PPT
E - Commerce Lecture #3
PPT
Lecture #2 - About MIS
PPTX
Attack lecture #2 ppt
PPTX
Information Security Lecture #1 ppt
Wireless Networking
Wi MAX Technology
WAP Technology
I - Mode Technology
Cellular Communication
Computer Network PDF - Course Material 2013
Computer Wireless Network Pdf - course material 2013
Smartcard lecture #5
Lecture #5 Data Communication and Network
Database Management System Lecture #4
Watermarking lecture #4
Virus Lecture #3
E - Commerce Lecture #3
Lecture #2 - About MIS
Attack lecture #2 ppt
Information Security Lecture #1 ppt

Recently uploaded (20)

DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
Empowerment Technology for Senior High School Guide
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
RIZALS-LIFE-HIGHER-EDUCATION-AND-LIFE-ABROAD.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
IP : I ; Unit I : Preformulation Studies
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PPTX
Education and Perspectives of Education.pptx
PDF
Journal of Dental Science - UDMY (2021).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
My India Quiz Book_20210205121199924.pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
semiconductor packaging in vlsi design fab
Empowerment Technology for Senior High School Guide
AI-driven educational solutions for real-life interventions in the Philippine...
RIZALS-LIFE-HIGHER-EDUCATION-AND-LIFE-ABROAD.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
IP : I ; Unit I : Preformulation Studies
Environmental Education MCQ BD2EE - Share Source.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Journal of Dental Science - UDMY (2022).pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
plant tissues class 6-7 mcqs chatgpt.pdf
Module on health assessment of CHN. pptx
Climate and Adaptation MCQs class 7 from chatgpt
Education and Perspectives of Education.pptx
Journal of Dental Science - UDMY (2021).pdf

Encryption

Editor's Notes

  • #4: Cryptography is the science of writing messages in secret codes . It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone Although we tend to use the words ‘code’ and ‘cipher’ interchangeably, technically they're two entirely different things. When you substitute each letter in a message for a different symbol that's a cipher. A code on the other hand means assigning a secret meaning to a word or phrase.
  • #5: In its earliest form, people have been attempting to conceal certain information that they wanted to keep to their own possession by substituting parts of the information with symbols, numbers and pictures.Ancient Babylonian merchants used intaglio, a piece of flat stone carved into a collage of images and some writing to identify themselves in trading transactions. Using this mechanism, they are producing what today we know as 'digital signature.' The public knew that a particular 'signature' belonged to this trader, but only he had the intaglio to produce that signature.
  • #7: encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
  • #8: Basic types of encryption may be considered asMANUAL ENCRYPTION:Manual encryption is a type that involves the use of encryption software. These are computer programs that encrypt various bits of information digitally. Manual encryption involves the user's participation completely. The files he wants to encrypt are chosen, and then an encryption type is chosen from a list that the security system provides. This is great for personal computers because it allows a user to encrypt personal files in a way that will suit him, thus protecting personal material on a computer. Transparent EncryptionTransparent encryption is another type of computer software encryption. It can be downloaded onto a computer to encrypt everything automatically. This is one of the most secure types of encryption available because it doesn't leave out anything that might be forgotten when using manual encryption. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen.
  • #9: Symmetric EncryptionNot all encryption is done via a computer software program. You can easily encrypt information by yourself. One of the simplest ways to do this is through symmetric encryption. Here, a letter or number coincides with another letter or number in the encryption code. You can make the code up yourself--for example, a=1, b=2 and so on. You can take any written text and substitute letters and numbers for their coded counterpart, thus encrypting the text. Asymmetric EncryptionAsymmetric encryption is a secure and easy way that can be used to encrypt data that you will be receiving. It is generally done electronically. A public key is given out to whomever you want or posted somewhere for the public to see. They can then encrypt information using the key and send it to you. This is often done when writing emails. However, to decipher the encrypted code, there is another key, a private one, that only one person has. This means that while any can encrypt the data with the public key, it can only be read again by whomever has the private key.