SlideShare a Scribd company logo
A
PRESENTATION ON
“DATA
ENCRYPTION”
Presented by: Anu bala
Roll no 3373







Data encryption definition.
Types of data encryption.
Difference between symmetric and asymmetric.
Encryption Methods.
Data Encryption Standard (DES).
Public Key Cryptosystem

CONTENT


Data encryption refers to mathematical
calculations and algorithmic schemes that
transform plaintext into cyphertext, a form that
is non-readable to unauthorized parties. The
recipient of an encrypted message uses a key
which triggers the algorithm mechanism to
decrypt the data, transforming it to the original
plaintext version

Data encryption definition
Data encryption
*plaintext
*encryption algorithm
*public and private key
*cipher text
* decryption algorithm

A public key encryption
scheme has six ingredients


In symmetric
(Single key):
The encryption
and decryption keys
are the same.

Types of data encryption
.



Symmetric key
encryption is also
known as private
encryption, because it
uses the same key and
same cryptographic
algorithm to encrypt
and decrypt data.
A symmetric encryption scheme
has five ingredients


* Plaintext
* Encryption Algorithm
* Secret key
* Cipher Text
* Decription


In asymmetric
(two keys):
The encryption
and decryption
keys are
different.

.
.






The symmetric one key is used for symmetric
and a symmetric but in asymmetric different
keys are use for encryption and description.
In symmetric, sender and receiver must share
the algorithm and key but in a symmetric
sender and receiver must have one matched
pair of keys.
In symmetric key must be kept secret but in
asymmetric two keys must of kept secret.

Difference b/w Asymmetric &
Symmetric Encryption
Thanks

More Related Content

PPTX
Encryption
PPT
6. cryptography
PDF
Introduction to Windows Dictionary Attacks
PPTX
Cryptography
PDF
IPSec (Internet Protocol Security) - PART 1
PPTX
cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Encryption
6. cryptography
Introduction to Windows Dictionary Attacks
Cryptography
IPSec (Internet Protocol Security) - PART 1
cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY

What's hot (20)

PPTX
Diffie Hellman Key Exchange
PPTX
Advanced cryptography and implementation
PPTX
Cryptography and Network Security
PPTX
Cryptography.ppt
PDF
Asymmetric Cryptography
PPT
Cryptography Fundamentals
PPTX
Cryptography
PPT
13 asymmetric key cryptography
PPTX
Password cracking and brute force
PDF
Information Security Cryptography ( L01- introduction )
PPT
Information Security & Cryptography
PPTX
Cryptographic tools
 
PDF
Block Ciphers and the Data Encryption Standard
PPT
Fundamentals of cryptography
PPT
Encryption technology
PPTX
Cryptography and Information Security
PDF
Public private key
PPTX
Cryptography - Block cipher & stream cipher
ODP
Diffie_Hellman-Merkle Key Exchange
PPTX
Cryptography
Diffie Hellman Key Exchange
Advanced cryptography and implementation
Cryptography and Network Security
Cryptography.ppt
Asymmetric Cryptography
Cryptography Fundamentals
Cryptography
13 asymmetric key cryptography
Password cracking and brute force
Information Security Cryptography ( L01- introduction )
Information Security & Cryptography
Cryptographic tools
 
Block Ciphers and the Data Encryption Standard
Fundamentals of cryptography
Encryption technology
Cryptography and Information Security
Public private key
Cryptography - Block cipher & stream cipher
Diffie_Hellman-Merkle Key Exchange
Cryptography
Ad

Similar to Encryption (20)

PPTX
Cryptography
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
Lec # 7 Symmetric and asymmetric cryptography.pptx
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
Symmetric_Asymmetric_Encryption_PPT.pptx
PPTX
Encryption
PPT
cryptography
PPT
Chapter 2 part 1.ppt
PPT
Elementry Cryptography
PDF
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
PPTX
Data encryption
PPTX
encryption.pptx
PPTX
cryptography in computer and its module and application
PPTX
Encryption ppt
PDF
DES- Data Encryption Standard
PPTX
Cryptography by Durlab Kumbhakar
PPTX
Symmetric and asymmetric key
PPT
Symmetric and Asymmetric Encryption.ppt
Cryptography
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
Detailed description about the concept of E Commerce UNIT IV.pptx
Symmetric_Asymmetric_Encryption_PPT.pptx
Encryption
cryptography
Chapter 2 part 1.ppt
Elementry Cryptography
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
Data encryption
encryption.pptx
cryptography in computer and its module and application
Encryption ppt
DES- Data Encryption Standard
Cryptography by Durlab Kumbhakar
Symmetric and asymmetric key
Symmetric and Asymmetric Encryption.ppt
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Programs and apps: productivity, graphics, security and other tools
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Encryption