SlideShare a Scribd company logo
ENCRYPTION 
A GUIDE FOR EVERYONE 
WWW.CYBERGHOSTVPN.COM
WHAT IS IT? 
Encryption is the process through which informati-on 
or data is transformed (encoded) in such a way that is unreadable to anyone who does not have the knowledge of the way it was transformed. 
The information thus becomes available only to the 
authorized parties. This authorization works based 
on keys. Encoding the information is made by using an encryption key while decoding the information 
is made by using a decryption key. 
WHEN WAS 
IT INVENTED? 
100-44 B.C. Caesar used a cipher to hide his milita-ry 
correspondence. The key in this case was simply 
to shift to the right by three. 
The Greek historian Plutarch wrote, for example, 
about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder 
made out of wood. The general would wrap a pie- 
ce of parchment around the scytale and write his 
message along its length. When someone removed the paper from the cylinder, the writing appeared 
to be a jumble of nonsense. 
The Greeks were also the first to use ciphers, spe-cific 
codes that involve substitutions or transposi- 
tions of letters and numbers. 
HOW DOES IT WORK? 
Encryption prevents the interceptors of messages from having access to this information. Encryption 
does not prevent information from being intercep- 
ted by unwanted parties than the ones intended. 
The easiest comparison that will help you under-stand 
this is: postcard versus letter in a sealed en-velope. 
Unencrypted information transmitted via 
the Internet is like a message written on a post- 
card, anyone who can intercept it can read it. The 
encrypted information is like a letter, it is not vi-sible 
even for those who are in contact with it. Of course these persons can open it, itโ€™s not the same 
thing for the encrypted message, and this is where the metaphor ends. 
The text before encryption is called PLAINTEXT. 
The encrypted text is called CIPHER TEXT. 
Encryption example 
> Plain text: A B C 
Encryption algorithm = move each letter one 
place to the left in the alphabet 
> Cipher text: B C D 
EXAMPLE:
SYMMETRICAL ENCRYPTION 
There are two types of encryptions: symmetrical and public-key encryption. 
In symmetrical encryption the encryption and decryption key are the same. 
So the communicating parts exchanging information 
among them have the same key. 
PUBLIC VS. SYMMETRICAL ENCRYPTION 
= 
ENCRYPTION 
DECRYPTION 
PLAINTEXT 
CIPHERTEXT 
PLAINTEXT
PUBLIC KEY ENCRYPTION 
In public-key encryption the encryption key is made public (public key) so anyone can use it to encrypt messages, but the decryption key is limitedly available to the intended receiving party (private key). 
The public key is available to any computer that wants to have it and encrypt messages, while he private key is available only for your computer. 
For decoding a message both public and private keys are necessary. If somebody intercepts a message they will not be able to read it without the private key. 
The pair of keys is constructed using prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is an infinite number of prime numbers which means infinite combinations and possibilities for keys. 
PGP, a very popular software that uses this type of encryption, works with the following process: the sender encrypts information using a symmetric key, the symmetric keys is then encrypted using the public key of the receiver. The receiver uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document. 
PUBLIC VS. SYMMETRICAL ENCRYPTION 
= 
ENCRYPTION 
PLAINTEXT 
CIPHERTEXT 
PLAINTEXT 
PUBLIC KEY 
PRIVATE KEY 
DECRYPTION
A HISTORY 
OF ENCRYPTION 
100-44 B.C. โ€“ Caeser used a cipher to hide his mili-tary 
correspondence. The key in this case was sim-ply 
to shift to the right by three. 
1973 โ€“ GCHQ describes for the first time this pro- 
cess of asymmetric encryption. 
1977 โ€“ The first major asymmetric algorithm deve-loped 
for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key. 
Although a 56-bit key offers more than 70 quadrillion 
possible combinations (70,000,000,000,000,000), 
an attack of brute force (simply trying every possib-le 
combination in order to find the right key) could 
decipher encrypted data in a short while. DES has 
since been replaced by the Advanced Encryption 
Standard (AES), which uses 128-, 192- or 256-bit 
keys. 
1976 - paper published in the journal IEEE Transac-tions 
on Information Theory, titled โ€žNew Directions 
in Cryptography,โ€œ addressed this problem and offe-red 
up a solution: public-key encryption. 
1991 โ€“ Phil Zimmermann writes and application 
with public key available called Pretty Good Privacy 
(PGP) 
2010 โ€“ Symantec acquires PGP for $300M 
WHERE IS 
ENCRYPTION USED? 
It started out as being used by militaries and governments to allow secret communications. 
Today it is used on a large scale by companies and 
civilians both to protect company and personal 
data. 
Encryption protects security and privacy of the files on computer and it is also used to protect data 
transferred in different networks: on the internet, 
on mobile telephones, wireless microphones, wi-reless 
intercom systems, Bluetooth devices and bank automatic teller machines. 
When it comes to security of information it is not 
only important to keep the confidentiality of the in- 
formation but also the integrity and make sure the message is authenticating by employing methods 
like digital signatures. 
DATA INTEGRITY 
HASHING 
Hashing is another method through of transforma- 
tion of a data in which you can ensure integrity of 
it. It ensures that the data has not been tampered 
with. 
The same output can be produced by different in-puts. 
This is an irreversible procedure, you cannot get from output to input. 
Sources: 
http://en.wikipedia.org/wiki/Encryption 
https://ssd.eff.org/tech/encryption 
http://www.webopedia.com/TERM/H/hashing.html

More Related Content

PPTX
Crytography
PPTX
Cryptography
PPTX
PPT
Crytography
PPT
Cryptography and E-Commerce
PPTX
Encryption
PPTX
My cryptography
PPSX
Cryptography
Crytography
Cryptography
Crytography
Cryptography and E-Commerce
Encryption
My cryptography
Cryptography

What's hot (9)

PPTX
Advanced cryptography and implementation
PPT
Cryptography
PDF
Ss
PPTX
Data encryption
PPTX
Overview of cryptography
PPS
network security, cryptography,steganography
PPTX
Cryptography
PPTX
Cryptography
PDF
Sw week12
Advanced cryptography and implementation
Cryptography
Ss
Data encryption
Overview of cryptography
network security, cryptography,steganography
Cryptography
Cryptography
Sw week12
Ad

Viewers also liked (19)

PPT
Kid Safety On The Internet
PPTX
Cnwl e safety-tutorial_2013
PPSX
Computer awareness i logo
KEY
Untangling the Web: Keeping Your Family Safe Online
PDF
Protecting your online privacy
PDF
The Future of Data in a Connected World
PDF
Computer awareness
PPTX
The Mobile Internet: Meeting Demand and Growing Profitably
PPT
Online Safety 3.0
PPTX
Internet Safety Presentation for Parents
PPTX
Online Safety 3.0 - Presentation for Parents and Teachers
PPTX
INTERNET SAFETY FOR KIDS
PPT
Internet Safety Elementary
PPTX
Internet Security
ย 
PPTX
Internet Safety Slideshare
PPTX
Brain Computer Interface.ppt
PPT
Internet Safety Presentation
PPT
Brain computer interface
PPT
Internet Safety for Children Powerpoint
Kid Safety On The Internet
Cnwl e safety-tutorial_2013
Computer awareness i logo
Untangling the Web: Keeping Your Family Safe Online
Protecting your online privacy
The Future of Data in a Connected World
Computer awareness
The Mobile Internet: Meeting Demand and Growing Profitably
Online Safety 3.0
Internet Safety Presentation for Parents
Online Safety 3.0 - Presentation for Parents and Teachers
INTERNET SAFETY FOR KIDS
Internet Safety Elementary
Internet Security
ย 
Internet Safety Slideshare
Brain Computer Interface.ppt
Internet Safety Presentation
Brain computer interface
Internet Safety for Children Powerpoint
Ad

Similar to CyberGhost VPN Encryption Guide (20)

PDF
DataMotion-IG1-TheEvolutionofEncryption
PPTX
cryptography
PDF
Computer Security Chapter III.pdf
DOCX
Unit 1 QB.docx
PDF
Evolution of Cryptography and Cryptographic techniques
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Fundamentals of cryptography
PDF
Crypto_Artemis Final oooo Presentation.pdf
PPTX
Cryptography
PPTX
cryptography presentation this about how cryptography works
PDF
Week12
PPT
Rothke Info Security Canada 2007 Final
PPTX
Cryptography, Cryptology, Encryption and types
PPTX
Introduction to Cryptography CYB 303.pptx
PPTX
Cryptography
PDF
Security Systems for Digital Data - Paper
PDF
How encryption works
PPT
8-encryption.ppt
PDF
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
PPT
Cryptography - An Overview
ย 
DataMotion-IG1-TheEvolutionofEncryption
cryptography
Computer Security Chapter III.pdf
Unit 1 QB.docx
Evolution of Cryptography and Cryptographic techniques
CRYPTOGRAPHY AND NETWORK SECURITY
Fundamentals of cryptography
Crypto_Artemis Final oooo Presentation.pdf
Cryptography
cryptography presentation this about how cryptography works
Week12
Rothke Info Security Canada 2007 Final
Cryptography, Cryptology, Encryption and types
Introduction to Cryptography CYB 303.pptx
Cryptography
Security Systems for Digital Data - Paper
How encryption works
8-encryption.ppt
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
Cryptography - An Overview
ย 

Recently uploaded (20)

PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
PPTX
Introduction to Information and Communication Technology
PDF
The Internet -By the Numbers, Sri Lanka Edition
ย 
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
artificial intelligence overview of it and more
PDF
Testing WebRTC applications at scale.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
Vigrab.top โ€“ Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
Introduction to Information and Communication Technology
The Internet -By the Numbers, Sri Lanka Edition
ย 
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Tenda Login Guide: Access Your Router in 5 Easy Steps
522797556-Unit-2-Temperature-measurement-1-1.pptx
presentation_pfe-universite-molay-seltan.pptx
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
WebRTC in SignalWire - troubleshooting media negotiation
Cloud-Scale Log Monitoring _ Datadog.pdf
artificial intelligence overview of it and more
Testing WebRTC applications at scale.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Design_with_Watersergyerge45hrbgre4top (1).ppt
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
Internet___Basics___Styled_ presentation
Vigrab.top โ€“ Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...

CyberGhost VPN Encryption Guide

  • 1. ENCRYPTION A GUIDE FOR EVERYONE WWW.CYBERGHOSTVPN.COM
  • 2. WHAT IS IT? Encryption is the process through which informati-on or data is transformed (encoded) in such a way that is unreadable to anyone who does not have the knowledge of the way it was transformed. The information thus becomes available only to the authorized parties. This authorization works based on keys. Encoding the information is made by using an encryption key while decoding the information is made by using a decryption key. WHEN WAS IT INVENTED? 100-44 B.C. Caesar used a cipher to hide his milita-ry correspondence. The key in this case was simply to shift to the right by three. The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a pie- ce of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. The Greeks were also the first to use ciphers, spe-cific codes that involve substitutions or transposi- tions of letters and numbers. HOW DOES IT WORK? Encryption prevents the interceptors of messages from having access to this information. Encryption does not prevent information from being intercep- ted by unwanted parties than the ones intended. The easiest comparison that will help you under-stand this is: postcard versus letter in a sealed en-velope. Unencrypted information transmitted via the Internet is like a message written on a post- card, anyone who can intercept it can read it. The encrypted information is like a letter, it is not vi-sible even for those who are in contact with it. Of course these persons can open it, itโ€™s not the same thing for the encrypted message, and this is where the metaphor ends. The text before encryption is called PLAINTEXT. The encrypted text is called CIPHER TEXT. Encryption example > Plain text: A B C Encryption algorithm = move each letter one place to the left in the alphabet > Cipher text: B C D EXAMPLE:
  • 3. SYMMETRICAL ENCRYPTION There are two types of encryptions: symmetrical and public-key encryption. In symmetrical encryption the encryption and decryption key are the same. So the communicating parts exchanging information among them have the same key. PUBLIC VS. SYMMETRICAL ENCRYPTION = ENCRYPTION DECRYPTION PLAINTEXT CIPHERTEXT PLAINTEXT
  • 4. PUBLIC KEY ENCRYPTION In public-key encryption the encryption key is made public (public key) so anyone can use it to encrypt messages, but the decryption key is limitedly available to the intended receiving party (private key). The public key is available to any computer that wants to have it and encrypt messages, while he private key is available only for your computer. For decoding a message both public and private keys are necessary. If somebody intercepts a message they will not be able to read it without the private key. The pair of keys is constructed using prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is an infinite number of prime numbers which means infinite combinations and possibilities for keys. PGP, a very popular software that uses this type of encryption, works with the following process: the sender encrypts information using a symmetric key, the symmetric keys is then encrypted using the public key of the receiver. The receiver uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document. PUBLIC VS. SYMMETRICAL ENCRYPTION = ENCRYPTION PLAINTEXT CIPHERTEXT PLAINTEXT PUBLIC KEY PRIVATE KEY DECRYPTION
  • 5. A HISTORY OF ENCRYPTION 100-44 B.C. โ€“ Caeser used a cipher to hide his mili-tary correspondence. The key in this case was sim-ply to shift to the right by three. 1973 โ€“ GCHQ describes for the first time this pro- cess of asymmetric encryption. 1977 โ€“ The first major asymmetric algorithm deve-loped for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key. Although a 56-bit key offers more than 70 quadrillion possible combinations (70,000,000,000,000,000), an attack of brute force (simply trying every possib-le combination in order to find the right key) could decipher encrypted data in a short while. DES has since been replaced by the Advanced Encryption Standard (AES), which uses 128-, 192- or 256-bit keys. 1976 - paper published in the journal IEEE Transac-tions on Information Theory, titled โ€žNew Directions in Cryptography,โ€œ addressed this problem and offe-red up a solution: public-key encryption. 1991 โ€“ Phil Zimmermann writes and application with public key available called Pretty Good Privacy (PGP) 2010 โ€“ Symantec acquires PGP for $300M WHERE IS ENCRYPTION USED? It started out as being used by militaries and governments to allow secret communications. Today it is used on a large scale by companies and civilians both to protect company and personal data. Encryption protects security and privacy of the files on computer and it is also used to protect data transferred in different networks: on the internet, on mobile telephones, wireless microphones, wi-reless intercom systems, Bluetooth devices and bank automatic teller machines. When it comes to security of information it is not only important to keep the confidentiality of the in- formation but also the integrity and make sure the message is authenticating by employing methods like digital signatures. DATA INTEGRITY HASHING Hashing is another method through of transforma- tion of a data in which you can ensure integrity of it. It ensures that the data has not been tampered with. The same output can be produced by different in-puts. This is an irreversible procedure, you cannot get from output to input. Sources: http://en.wikipedia.org/wiki/Encryption https://ssd.eff.org/tech/encryption http://www.webopedia.com/TERM/H/hashing.html