SlideShare a Scribd company logo
ENCRYPTION
Presented To:
Sir. Anwar Rashad
Presented By:
Adnan Malak
Date:
07 January, 2016.
• What is Encryption.
• Types of Encryption.
• Keys use in Encryption.
• Comparison.
• Which One is better .
• Why we use ?
• Application
• Conclusion.
Agenda:
What is encryption?
• A process that converts original information, also
called plain text into a difficult-to-interpret form
called cipher text.
 Done by using an encryption algorithm, a formula used
to turn plain text into ciphertext.
TYPES OF ENCRYPTION
ASYMMETRIC
ENCRYPTION
SYMMETRIC
ENCRYPTION
SYMMETRIC ENCRYPTION
• Also known as secret key. Sender & receiver
uses same key & an encryption/decryption
algorithm to encrypt/decrypt data. i.e. the key
is shared.
SYMMETRIC ENCRYPTION
ENCRYPTION DECRYPTION
CIPHERTEXT
SENDER RECEIVER
SECRET KEY
TRADITIONAL
CIPHERS
SUBSTITUTION
CIPHER
TRANSPOSITION
CIPHER
SUBSTITUTION CIPHERS
• A substitution technique is one in which the
letters/number/symbols of plaintext are
replaced by other letters/numbers/symbols.
e.g. A D, T Z
2 5, 3 6
TRANSPOSITION CIPHER
• In the transposition technique the positions of
letters/numbers/symbols in plaintext is changed with
one another.
• Plain text: MEET ME AFTER PARTY
• Cipher text: TEMEEMEFAPTRYRAT
• KEY USED: 421635
1 2 3 4 5 6
M E E T M E
A F T E R P
A R T Y
4 2 1 6 3 5
T E M E E M
E F A P T R
Y R A T
ASYMMETRIC ENCRYPTION
• Also known as public key cryptography.
Sender & receiver uses different keys for
encryption & decryption namely PUBLIC &
PRIVATE respectively.
ASYMMETRIC ENCRYPTION
ENCRYPTION DECRYPTION
CIPHERTEXT
SENDER RECEIVER
PUBLIC KEY PRIVATE KEY
KEYS USED IN ENCRYPTION
SYMMETRIC
ENCRYPTION
ASYMMETRIC
ENCRYPTION
COMPARISON
SYMMETRIC ENCRYPTION ASYMMETRIC ENCRYPTION
1) The same algorithm with the same key
is used for encryption and decryption.
2) The key must be kept secret.
3) It may be impossible or at least
impractical to decipher a message if no
other information is available.
1) One algorithm is used for encryption
and decryption with a pair of keys, one for
encryption and one for decryption.
2) One of the two keys must be kept
secret.
3) It may be impossible or at least
impractical to decipher a message if no
other information is available.
Which one is better?
• Although, symmetric encryption is fast, it is not as
safe as asymmetric encryption because someone
could “steal” the key and decode the messages.
But because of its speed, it's commonly used for e-
commerce transactions.
 Asymmetric encryption is more complex--and more
secure. Asymmetric encryption's added safety comes at
a price: More computation is required, so the process
takes longer.
Why use encryption?
• Authentication
• Protects personal data such as passwords.
 Privacy
 Provides for confidentiality of private information.
 Accountability
 Prevents denial or plagiarism.
 Integrity
 Ensures that a document or file has not been altered.
APPLICATIONS
• Defense services
• Secure data manipulation
• E –commerce
• Business transactions
• Internet payment systems
• User identification systems
• Access control
• Data security
CONCLUSION
• By using of encryption techniques a fair unit of
confidentiality, authentication, integrity,
access control and availability of data is
maintained.
Thank
You

More Related Content

PPTX
Digital certificates
PPT
Cryptography
PPTX
Cryptography
PPT
Technical seminar on Security
PPT
Digital signature
PPTX
Encryption
PPT
Introduction to Digital signatures
PPT
Digital Signature
Digital certificates
Cryptography
Cryptography
Technical seminar on Security
Digital signature
Encryption
Introduction to Digital signatures
Digital Signature

What's hot (20)

PPTX
Network security and cryptography
PPTX
Digital certificates
PDF
End-User Security Awareness
PDF
Threat Intelligence & Threat research Sources
PPTX
Cyber attacks and IT security management in 2025
PPTX
Overview of cryptography
PPTX
Cryptography.ppt
PPT
Cryptography Fundamentals
PPT
Cryptography
ODP
Pen test methodology
PPTX
SOC 2 Compliance and Certification
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Phishing Awareness Training.pptx
PPTX
Introduction to PCI DSS
PPTX
Advanced cryptography and implementation
PPTX
Phishing Attack : A big Threat
PPTX
Cryptography
PDF
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
PDF
Introduction to Cryptography
PPTX
Introduction to cyber security amos
Network security and cryptography
Digital certificates
End-User Security Awareness
Threat Intelligence & Threat research Sources
Cyber attacks and IT security management in 2025
Overview of cryptography
Cryptography.ppt
Cryptography Fundamentals
Cryptography
Pen test methodology
SOC 2 Compliance and Certification
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Phishing Awareness Training.pptx
Introduction to PCI DSS
Advanced cryptography and implementation
Phishing Attack : A big Threat
Cryptography
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Introduction to Cryptography
Introduction to cyber security amos
Ad

Similar to Encryption (20)

PPTX
Lec # 7 Symmetric and asymmetric cryptography.pptx
PPTX
Encryption ppt
PPTX
Symmetric and Asymmetric Encryption
PPTX
Cryptography
PDF
DES- Data Encryption Standard
PPT
cryptography
DOCX
Seminar report on symmetric key
PPTX
Data encryption
PPTX
PPTX
PPTX
encryption.pptx
PDF
Encryption
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
Cryptography
PPT
Symmetric and Asymmetric Encryption infosec.ppt
PPT
DIS- Symmetric and Asymmetric Encryption.ppt
PDF
PresentationonCRYPTOGRAPHYppt.pdf
Lec # 7 Symmetric and asymmetric cryptography.pptx
Encryption ppt
Symmetric and Asymmetric Encryption
Cryptography
DES- Data Encryption Standard
cryptography
Seminar report on symmetric key
Data encryption
encryption.pptx
Encryption
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Cryptography
Symmetric and Asymmetric Encryption infosec.ppt
DIS- Symmetric and Asymmetric Encryption.ppt
PresentationonCRYPTOGRAPHYppt.pdf
Ad

More from Adnan Malak (6)

PPTX
Pres cloud computing
PPT
Storage hardware
PPTX
Input devices
PPTX
knapsack problem
PPT
Characteristics ofcomputer
PPT
Computer components
Pres cloud computing
Storage hardware
Input devices
knapsack problem
Characteristics ofcomputer
Computer components

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Classroom Observation Tools for Teachers
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Lesson notes of climatology university.
PDF
1_English_Language_Set_2.pdf probationary
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction to Building Materials
Final Presentation General Medicine 03-08-2024.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Classroom Observation Tools for Teachers
Chinmaya Tiranga quiz Grand Finale.pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Orientation - ARALprogram of Deped to the Parents.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Unit 4 Skeletal System.ppt.pptxopresentatiom
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Computing-Curriculum for Schools in Ghana
Lesson notes of climatology university.
1_English_Language_Set_2.pdf probationary
IGGE1 Understanding the Self1234567891011
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Digestion and Absorption of Carbohydrates, Proteina and Fats
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
Introduction to Building Materials

Encryption

  • 1. ENCRYPTION Presented To: Sir. Anwar Rashad Presented By: Adnan Malak Date: 07 January, 2016.
  • 2. • What is Encryption. • Types of Encryption. • Keys use in Encryption. • Comparison. • Which One is better . • Why we use ? • Application • Conclusion. Agenda:
  • 3. What is encryption? • A process that converts original information, also called plain text into a difficult-to-interpret form called cipher text.  Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.
  • 5. SYMMETRIC ENCRYPTION • Also known as secret key. Sender & receiver uses same key & an encryption/decryption algorithm to encrypt/decrypt data. i.e. the key is shared.
  • 8. SUBSTITUTION CIPHERS • A substitution technique is one in which the letters/number/symbols of plaintext are replaced by other letters/numbers/symbols. e.g. A D, T Z 2 5, 3 6
  • 9. TRANSPOSITION CIPHER • In the transposition technique the positions of letters/numbers/symbols in plaintext is changed with one another. • Plain text: MEET ME AFTER PARTY • Cipher text: TEMEEMEFAPTRYRAT • KEY USED: 421635 1 2 3 4 5 6 M E E T M E A F T E R P A R T Y 4 2 1 6 3 5 T E M E E M E F A P T R Y R A T
  • 10. ASYMMETRIC ENCRYPTION • Also known as public key cryptography. Sender & receiver uses different keys for encryption & decryption namely PUBLIC & PRIVATE respectively.
  • 12. KEYS USED IN ENCRYPTION SYMMETRIC ENCRYPTION ASYMMETRIC ENCRYPTION
  • 13. COMPARISON SYMMETRIC ENCRYPTION ASYMMETRIC ENCRYPTION 1) The same algorithm with the same key is used for encryption and decryption. 2) The key must be kept secret. 3) It may be impossible or at least impractical to decipher a message if no other information is available. 1) One algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption. 2) One of the two keys must be kept secret. 3) It may be impossible or at least impractical to decipher a message if no other information is available.
  • 14. Which one is better? • Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e- commerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 15. Why use encryption? • Authentication • Protects personal data such as passwords.  Privacy  Provides for confidentiality of private information.  Accountability  Prevents denial or plagiarism.  Integrity  Ensures that a document or file has not been altered.
  • 16. APPLICATIONS • Defense services • Secure data manipulation • E –commerce • Business transactions • Internet payment systems • User identification systems • Access control • Data security
  • 17. CONCLUSION • By using of encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained.

Editor's Notes

  • #2: This template can be used as a starter file for presenting training materials in a group setting. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.
  • #19: Use a section header for each of the topics, so there is a clear transition to the audience.