encryption

12
A PRESENTATION ON “DATA ENCRYPTION” Presented by: Anu bala Roll no 3373

Upload: nitin-parbhakar

Post on 31-Oct-2014

993 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Encryption

APRESENTATION ON“DATA ENCRYPTION”

Presented by: Anu balaRoll no 3373

Page 2: Encryption

Data encryption definition. Types of data encryption. Difference between symmetric and

asymmetric. Encryption Methods. Data Encryption Standard (DES). Public Key Cryptosystem

CONTENT

Page 3: Encryption

Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext into cyphertext, a form that is non-readable to unauthorized parties. The recipient of an encrypted message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the original plaintext version

Data encryption definition

Page 4: Encryption

Data encryption

Page 5: Encryption

*plaintext*encryption algorithm*public and private key*cipher text* decryption algorithm

A public key encryption scheme has six ingredients

Page 6: Encryption

Types of data encryption

In symmetric (Single key):

The encryption and decryption keys are the same.

Page 7: Encryption

.

Symmetric key encryption is also known as private encryption, because it uses the same key and same cryptographic algorithm to encrypt and decrypt data.

Page 8: Encryption

* Plaintext * Encryption Algorithm

* Secret key* Cipher Text* Decription

A symmetric encryption scheme has five ingredients

Page 9: Encryption

.

In asymmetric (two keys): The encryption

and decryption keys are different.

Page 10: Encryption

.

Page 11: Encryption

The symmetric one key is used for symmetric and a symmetric but in asymmetric different keys are use for encryption and description.

In symmetric, sender and receiver must share the algorithm and key but in a symmetric sender and receiver must have one matched pair of keys.

In symmetric key must be kept secret but in asymmetric two keys must of kept secret.

Difference b/w Asymmetric & Symmetric Encryption

Page 12: Encryption

Thanks