Name Maryam Mohammed Alshami ID H00204657 Encryption is the process of encoding messages or information in such a way that only authorized parties can read it Important part of computing to keep our file ID: 434011
Download Presentation The PPT/PDF document "Encryption" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Encryption
Name :
Maryam Mohammed
Alshami
ID:
H00204657Slide2
Encryption
:
is the process of encoding messages or information in such a way that only authorized parties can read it.Important part of computing to keep our file secure and If you have secure communication you need to use Encryption Slide3
*. Encryption
is the process in which readable text is converts into the unreadable text. In which the readable text is referred as "Plain text" while unreadable text is referred as cipher text.*. Decryption is the process in which unreadable text is converts back into the readable textdifference between encryption and decryption?Slide4
two type of Encryption
Symmetric
keyEncryption algorithms that use the same key for encrypting and for decrypting information are called symmetric-key algorithms. The symmetric key is also called a secret key because it is kept as a shared secret between the sender and receiver of information. Otherwise, the confidentiality of the encrypted information is compromised.
Slide5
Figure 14.1 shows basic symmetric key encryption and decryption.Slide6
Public key
encryption
Encryption algorithms that use different keys for encrypting and decrypting information are most often called public-key algorithms but are sometimes also called asymmetric key algorithms . Public key encryption requires the use of both a private key (a key that is known only to its owner) and a public key (a key that is available to and known to other entities on the network). A user's public key, for example, can be published in the directory so that it is accessible to other people in the organization. The two keys are different but complementary in function. Information that is encrypted with the public key can be decrypted only with the corresponding private key of the set. two type of
Encryption (con’t)Slide7
Figure 14.2 shows basic encryption and decryption with asymmetric keys.Slide8
Investigating Encryption Technologies
:
UCONN Health Center
Windows EFS:
Supports encryption of file systems on W2K, XP and Server 2003
Certificate Based
Asymmetric public key encryptionSymmetric 3DES encryption for file or directory on diskMay be implemented using self generated certs or centrally through a Certificate Authority (CA)Slide9
Windows EFS:
Limitations:
Microsoft centric solution
Encryption key is stored in the user’s profile
Key recovery is enabled through a policy that adds a recovery key to the encryption scheme; typically accessible to domain/local administrator
Investigating Encryption Technologies
:UCONN Health CenterSlide10
Investigating Encryption Technologies
:
UCONN Health Center
PGP:
Limitations:
Geared toward email encryption – Disk encryption appears to be viewed as an ancillary benefit
No Linux Support
ExpensiveLooks like we’ll be moving in this direction!Slide11
When should encryption be used?
Whenever there is a chance for interception or exposure by an individually who does not have a need to know
Encryption IssuesSlide12
Encryption Issues
(cont’d)
What is the Risk/Reward Equation for encryption?
Risks are high for encrypting
stored data
– Loss of key generally = loss of data
Offset by the recent string of incidents where PCs/laptops containing sensitive info have been stolen. Info that was not encrypted must be assumed to have been disclosed.
Risks are high for not encrypting data in motion – Plaintext messages can be analyzedHard to tell if unencrypted data has been viewed or altered