SlideShare a Scribd company logo
4
Most read
6
Most read
14
Most read
Encryption in Cyber Security
Vital component for protecting digital information against
cyberattacks and data breaches
What is Encryption?
Plain Text
Original, readable data
Cipher Text
Encrypted, unreadable data
Encryption Key
Value used to encrypt plain text
Decryption Key
Value used to decrypt cipher text
How Encryption Works
1 Algorithm Selection
Choose mathematical procedure to change data
2 Key Generation
Create unique encryption and decryption keys
3 Data Transformation
Apply algorithm and key to convert plain text
4 Secure Transmission
Send encrypted data over networks
Types of Encryption
Symmetric Encryption
Same key for encryption and decryption
• Faster processing
• Efficient for large data
• Key exchange challenge
Asymmetric Encryption
Public key for encryption, private for decryption
• More secure key exchange
• Slower for large volumes
• Complex key management
Symmetric Encryption Algorithms
AES
Advanced Encryption Standard, widely used and secure
DES
Data Encryption Standard, older and less secure
3DES
Triple DES, applies algorithm three times
Asymmetric Encryption Algorithms
RSA
Rivest-Shamir-Adleman, common for secure data transmission
ECC
Elliptic Curve Cryptography, shorter keys than RSA
DSA
Digital Signature Algorithm, used for signatures
Data at Rest Encryption
1 Hard Drives
Encrypt stored data on physical devices
2 Databases
Protect sensitive information in data repositories
3 Cloud Storage
Secure data stored in remote servers
Data in Transit Encryption
Sender
Encrypts data before transmission
Network
Encrypted data travels securely
Receiver
Decrypts received data
End-to-End Encryption
1 Sender Encryption
Message encrypted on sender's device
2 Secure Transmission
Encrypted message sent over network
3 Receiver Decryption
Message decrypted only on receiver's device
Digital Signatures
Authenticity
Verify sender's identity
Integrity
Ensure message hasn't
been altered
Non-repudiation
Sender can't deny sending
message
Virtual Private Networks (VPNs)
User Device
Connects to VPN server
Encrypted Tunnel
Secure data transmission
Internet
Access with enhanced privacy
Key Management Challenges
1 Generation
Creating strong, unique keys
2 Storage
Securely storing keys
3 Distribution
Safely sharing keys with authorized parties
4 Rotation
Regularly updating keys to maintain security
Performance Overhead
Latency
Encryption/decryption processes can introduce delays
Resource Consumption
Computational resources required for
encryption operations
Compliance and Legal Issues
GDPR
European Union data
protection regulation
HIPAA
US healthcare data privacy law
Regional Laws
Varying encryption regulations
across jurisdictions
Best Practices: Strong
Algorithms
Algorithm Key Length Security Level
AES 256-bit Very High
RSA 2048-bit High
ECC 256-bit High
Best Practices: Key Management
1 Secure Generation
Use reliable random number generators
2 Protected Storage
Employ hardware security modules (HSMs)
3 Controlled Distribution
Implement secure key exchange protocols
4 Regular Rotation
Change keys periodically to enhance security
Best Practices: Data Protection
At Rest
Encrypt all sensitive stored data
In Transit
Use secure protocols for data transmission
In Use
Implement secure computation techniques
Best Practices: System Updates
1
Regular Patching
Apply security updates promptly
2 Version Control
Maintain current encryption software
versions
3
Vulnerability Scanning
Regularly check for security weaknesses
Public Key Infrastructure (PKI)
1 Digital Certificates
Bind public keys to entities' identities
2 Certificate Authority (CA)
Issues and manages digital certificates
3 Registration Authority (RA)
Verifies user identity for CA
4 Certificate Repository
Stores and distributes certificates
PKI Applications
Secure Email
S/MIME for email
encryption and
signatures
Web Security
SSL/TLS for secure
browsing
Access Control
Certificate-based
authentication for
systems
Code Signing
Verify software
authenticity and
integrity
Future of Encryption
Quantum Encryption
Developing quantum-resistant
algorithms
AI Integration
Enhancing encryption with
artificial intelligence
Blockchain
Exploring decentralized
encryption solutions

More Related Content

PPT
Network Security Presentation Stallings.
PPT
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
PPT
CS553 ST7 Ch21 Network Security chapter 21
PPTX
Computer Introduction (Data Encryption)-Lecture05
PPTX
Encryption in Cyber Security with detailed
PDF
Cscu module 04 data encryption
PPT
Network Security: Standards and Cryptography
PPTX
Unit 7 : Network Security
Network Security Presentation Stallings.
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
CS553 ST7 Ch21 Network Security chapter 21
Computer Introduction (Data Encryption)-Lecture05
Encryption in Cyber Security with detailed
Cscu module 04 data encryption
Network Security: Standards and Cryptography
Unit 7 : Network Security

Similar to Encryption in information security ppt slideshare.pptx (20)

PPT
What is Encryption
PPTX
Fundamental Concept of Cryptography in Computer Security
PPT
Network Security and Cryptography
PPTX
Cryptography and network security
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PPTX
Encryption by fastech
PPT
1329 n 9460
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
DOCX
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docx
PPT
6. cryptography
PPTX
Encryption in Cryptography
PDF
Tokenization vs Encryption Difference Explained.pdf
PPT
What is digital signature or DSC
PPT
Encryption Primer por Cathy Nolan
PPT
A+ Update Endpoint Encryption
PPT
Cryptography
DOCX
network security
PPT
Crypt
PPT
network security
PPTX
Encryption techniques
What is Encryption
Fundamental Concept of Cryptography in Computer Security
Network Security and Cryptography
Cryptography and network security
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption by fastech
1329 n 9460
Fundamentals of Cryptography: Securing Data in the Digital Age
Chapter 8Secret and Public KeysChapter 8 OverviewManag.docx
6. cryptography
Encryption in Cryptography
Tokenization vs Encryption Difference Explained.pdf
What is digital signature or DSC
Encryption Primer por Cathy Nolan
A+ Update Endpoint Encryption
Cryptography
network security
Crypt
network security
Encryption techniques
Ad

Recently uploaded (20)

PDF
IGGE1 Understanding the Self1234567891011
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Lesson notes of climatology university.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Classroom Observation Tools for Teachers
PDF
Empowerment Technology for Senior High School Guide
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
IGGE1 Understanding the Self1234567891011
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Cell Types and Its function , kingdom of life
Unit 4 Skeletal System.ppt.pptxopresentatiom
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Digestion and Absorption of Carbohydrates, Proteina and Fats
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Indian roads congress 037 - 2012 Flexible pavement
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Hazard Identification & Risk Assessment .pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Lesson notes of climatology university.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Classroom Observation Tools for Teachers
Empowerment Technology for Senior High School Guide
What if we spent less time fighting change, and more time building what’s rig...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Ad

Encryption in information security ppt slideshare.pptx

  • 1. Encryption in Cyber Security Vital component for protecting digital information against cyberattacks and data breaches
  • 2. What is Encryption? Plain Text Original, readable data Cipher Text Encrypted, unreadable data Encryption Key Value used to encrypt plain text Decryption Key Value used to decrypt cipher text
  • 3. How Encryption Works 1 Algorithm Selection Choose mathematical procedure to change data 2 Key Generation Create unique encryption and decryption keys 3 Data Transformation Apply algorithm and key to convert plain text 4 Secure Transmission Send encrypted data over networks
  • 4. Types of Encryption Symmetric Encryption Same key for encryption and decryption • Faster processing • Efficient for large data • Key exchange challenge Asymmetric Encryption Public key for encryption, private for decryption • More secure key exchange • Slower for large volumes • Complex key management
  • 5. Symmetric Encryption Algorithms AES Advanced Encryption Standard, widely used and secure DES Data Encryption Standard, older and less secure 3DES Triple DES, applies algorithm three times
  • 6. Asymmetric Encryption Algorithms RSA Rivest-Shamir-Adleman, common for secure data transmission ECC Elliptic Curve Cryptography, shorter keys than RSA DSA Digital Signature Algorithm, used for signatures
  • 7. Data at Rest Encryption 1 Hard Drives Encrypt stored data on physical devices 2 Databases Protect sensitive information in data repositories 3 Cloud Storage Secure data stored in remote servers
  • 8. Data in Transit Encryption Sender Encrypts data before transmission Network Encrypted data travels securely Receiver Decrypts received data
  • 9. End-to-End Encryption 1 Sender Encryption Message encrypted on sender's device 2 Secure Transmission Encrypted message sent over network 3 Receiver Decryption Message decrypted only on receiver's device
  • 10. Digital Signatures Authenticity Verify sender's identity Integrity Ensure message hasn't been altered Non-repudiation Sender can't deny sending message
  • 11. Virtual Private Networks (VPNs) User Device Connects to VPN server Encrypted Tunnel Secure data transmission Internet Access with enhanced privacy
  • 12. Key Management Challenges 1 Generation Creating strong, unique keys 2 Storage Securely storing keys 3 Distribution Safely sharing keys with authorized parties 4 Rotation Regularly updating keys to maintain security
  • 13. Performance Overhead Latency Encryption/decryption processes can introduce delays Resource Consumption Computational resources required for encryption operations
  • 14. Compliance and Legal Issues GDPR European Union data protection regulation HIPAA US healthcare data privacy law Regional Laws Varying encryption regulations across jurisdictions
  • 15. Best Practices: Strong Algorithms Algorithm Key Length Security Level AES 256-bit Very High RSA 2048-bit High ECC 256-bit High
  • 16. Best Practices: Key Management 1 Secure Generation Use reliable random number generators 2 Protected Storage Employ hardware security modules (HSMs) 3 Controlled Distribution Implement secure key exchange protocols 4 Regular Rotation Change keys periodically to enhance security
  • 17. Best Practices: Data Protection At Rest Encrypt all sensitive stored data In Transit Use secure protocols for data transmission In Use Implement secure computation techniques
  • 18. Best Practices: System Updates 1 Regular Patching Apply security updates promptly 2 Version Control Maintain current encryption software versions 3 Vulnerability Scanning Regularly check for security weaknesses
  • 19. Public Key Infrastructure (PKI) 1 Digital Certificates Bind public keys to entities' identities 2 Certificate Authority (CA) Issues and manages digital certificates 3 Registration Authority (RA) Verifies user identity for CA 4 Certificate Repository Stores and distributes certificates
  • 20. PKI Applications Secure Email S/MIME for email encryption and signatures Web Security SSL/TLS for secure browsing Access Control Certificate-based authentication for systems Code Signing Verify software authenticity and integrity
  • 21. Future of Encryption Quantum Encryption Developing quantum-resistant algorithms AI Integration Enhancing encryption with artificial intelligence Blockchain Exploring decentralized encryption solutions