/
Encryption Encryption

Encryption - PowerPoint Presentation

trish-goza
trish-goza . @trish-goza
Follow
443 views
Uploaded On 2016-08-05

Encryption - PPT Presentation

Name Maryam Mohammed Alshami ID H00204657 Encryption is the process of encoding messages or information in such a way that only authorized parties can read it Important part of computing to keep our file ID: 434011

key encryption public text encryption key text public information algorithms symmetric decryption called data encrypting center process investigating technologies encrypted unreadable readable

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Encryption" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Encryption

Name :

Maryam Mohammed

Alshami

ID:

H00204657Slide2

Encryption

:

is the process of encoding messages or information in such a way that only authorized parties can read it.Important part of computing to keep our file secure and If you have secure communication you need to use Encryption Slide3

*. Encryption

is the process in which readable text is converts into the unreadable text. In which the readable text is referred as "Plain text" while unreadable text is referred as cipher text.*. Decryption is the process in which unreadable text is converts back into the readable textdifference between encryption and decryption?Slide4

two type of Encryption

Symmetric

keyEncryption algorithms that use the same key for encrypting and for decrypting information are called symmetric-key algorithms. The symmetric key is also called a secret key because it is kept as a shared secret between the sender and receiver of information. Otherwise, the confidentiality of the encrypted information is compromised.

Slide5

Figure 14.1 shows basic symmetric key encryption and decryption.Slide6

Public key

encryption

Encryption algorithms that use different keys for encrypting and decrypting information are most often called public-key algorithms but are sometimes also called asymmetric key algorithms . Public key encryption requires the use of both a private key (a key that is known only to its owner) and a public key (a key that is available to and known to other entities on the network). A user's public key, for example, can be published in the directory so that it is accessible to other people in the organization. The two keys are different but complementary in function. Information that is encrypted with the public key can be decrypted only with the corresponding private key of the set. two type of

Encryption (con’t)Slide7

Figure 14.2 shows basic encryption and decryption with asymmetric keys.Slide8

Investigating Encryption Technologies

:

UCONN Health Center

Windows EFS:

Supports encryption of file systems on W2K, XP and Server 2003

Certificate Based

Asymmetric public key encryptionSymmetric 3DES encryption for file or directory on diskMay be implemented using self generated certs or centrally through a Certificate Authority (CA)Slide9

Windows EFS:

Limitations:

Microsoft centric solution

Encryption key is stored in the user’s profile

Key recovery is enabled through a policy that adds a recovery key to the encryption scheme; typically accessible to domain/local administrator

Investigating Encryption Technologies

:UCONN Health CenterSlide10

Investigating Encryption Technologies

:

UCONN Health Center

PGP:

Limitations:

Geared toward email encryption – Disk encryption appears to be viewed as an ancillary benefit

No Linux Support

ExpensiveLooks like we’ll be moving in this direction!Slide11

When should encryption be used?

Whenever there is a chance for interception or exposure by an individually who does not have a need to know

Encryption IssuesSlide12

Encryption Issues

(cont’d)

What is the Risk/Reward Equation for encryption?

Risks are high for encrypting

stored data

– Loss of key generally = loss of data

Offset by the recent string of incidents where PCs/laptops containing sensitive info have been stolen. Info that was not encrypted must be assumed to have been disclosed.

Risks are high for not encrypting data in motion – Plaintext messages can be analyzedHard to tell if unencrypted data has been viewed or altered