encryption
DESCRIPTION
TRANSCRIPT
![Page 1: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/1.jpg)
APRESENTATION ON“DATA ENCRYPTION”
Presented by: Anu balaRoll no 3373
![Page 2: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/2.jpg)
Data encryption definition. Types of data encryption. Difference between symmetric and
asymmetric. Encryption Methods. Data Encryption Standard (DES). Public Key Cryptosystem
CONTENT
![Page 3: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/3.jpg)
Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the original plaintext version
Data encryption definition
![Page 4: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/4.jpg)
Data encryption
![Page 5: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/5.jpg)
*plaintext*encryption algorithm*public and private key*cipher text* decryption algorithm
A public key encryption scheme has six ingredients
![Page 6: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/6.jpg)
Types of data encryption
In symmetric (Single key):
The encryption and decryption keys are the same.
![Page 7: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/7.jpg)
.
Symmetric key encryption is also known as private encryption, because it uses the same key and same cryptographic algorithm to encrypt and decrypt data.
![Page 8: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/8.jpg)
* Plaintext * Encryption Algorithm
* Secret key* Cipher Text* Decription
A symmetric encryption scheme has five ingredients
![Page 9: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/9.jpg)
.
In asymmetric (two keys): The encryption
and decryption keys are different.
![Page 10: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/10.jpg)
.
![Page 11: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/11.jpg)
The symmetric one key is used for symmetric and a symmetric but in asymmetric different keys are use for encryption and description.
In symmetric, sender and receiver must share the algorithm and key but in a symmetric sender and receiver must have one matched pair of keys.
In symmetric key must be kept secret but in asymmetric two keys must of kept secret.
Difference b/w Asymmetric & Symmetric Encryption
![Page 12: Encryption](https://reader033.vdocuments.mx/reader033/viewer/2022061110/54531d17af795984568b4a6e/html5/thumbnails/12.jpg)
Thanks