Data Encryption - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Data Encryption

Description:

What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables you to ... – PowerPoint PPT presentation

Number of Views:785
Avg rating:3.0/5.0
Slides: 14
Provided by: Dra213
Category:
Tags: data | encryption

less

Transcript and Presenter's Notes

Title: Data Encryption


1
Data Encryption
2
What is Encryption?
- The translation of data into a secret code
- To read an encrypted file, you must have access
to a secret key or password that enables you to
decrypt it
- Unencrypted data is called plain text
- encrypted data is referred to as cipher text
3
Plain text
Cipher text
Dear students, My phone no. Is 24750331
Ghdu vwxghqwv, Pb skrqh qr. Lv 57083664
Encrypt
Decrypt
Dear students, My phone no. Is 24750331
Plain text
4
Activity
Encrypted text
Fgct encuu yg ctg iqkpi vq vcnm cdqwv fcvc
gpetarvkqp
Original text
5
Common algorithms of Encryption
Symmetric Encryption
Asymmetric Encryption
6
Symmetric Encryption
A type of encryption where the same key is used
to encrypt and decrypt the message
7
Symmetric Encryption (Example)
Plain text
1 0 1 1 0 1 1 0
Same Key
Encrypt
Key
1 1 0 1 1 1 1 0
XOR
Cipher text
0 1 1 0 1 0 0 1
Key
1 1 0 1 1 1 1 0
XOR
Decrypt
Plain text
1 0 1 1 0 1 1 0
8
Asymmetric Encryption
Asymmetric encryption (also called public-key
encryption) involves a pair of keys - a public
and a private key.
The public key is published in a public directory
and the corresponding private key is kept secret.
9
Asymmetric Encryption
The sender of the data encrypts the data with the
public key of the receiver
The data can be decrypted only with the private
key of the receiver
10
Asymmetric Encryption
Plain Text
Plain Text
Cipher Text
11
How to use two different keys?
One key is the inverse of the other
Public key 3, Private key 1/3 Plain text 4
Encryption cipher text public key plain
text 3
4
12 Decryption plain text private key cipher
text 1/3
12 4
12
Discussion
What are the uses of encryption?
13
Activity
Construct a simple algorithm of encryption.
Write a Comment
User Comments (0)
About PowerShow.com