ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Digital Signatures. Anononymity and the Internet.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Encryption Methods By: Michael A. Scott
Informatics and Control Systems Faculty. Student: Levan Julakidze Informatics and Control Systems Faculty Doctorate II year Leader: Zurab Kochladze TSU.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
1 Lesson Internet Organization network Fire wall.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Computer encryption is… Based on the science of cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Encryption.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public Key Encryption.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Intro to Cryptography Lesson Introduction
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Information Systems Design and Development Security Precautions Computing Science.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Digital Signatures.
Topic 1: Data, information, knowledge and processing
M3: Encryption r By Andrew Stringer.
Security through Encryption
Cryptography and Network Security
Computer Security Chapter Two
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

ENCRYPTION Alex Piercey Erica Reid

What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used on computers  Is used in hopping, banking,  A secure server begins with https, rather then http

History of Encryption  Intaglio was the first use of encryption  Was a collage of images and text  only the trader knows how to read the text  the public couldn’t read the text  The collage of images and text was also used to identify themselves to the public this is what we call today as “digital signature”  “666” was implied as a encrypted message  ancient recipes where even encrypted to protect from "stealing" them for commercial value

History of Encryption - In War  WW2 Germans and US both sent messages encrypted  Mathematician Marian Rejewski at the Polands Cipher Bureau decrypted the encryption code.  This was considered the greatest cryptanalysis breakthrough within a thousand years.

Asymmetric Algorithms  Complex but more secure than symmetric  Uses two different keys to encrypt and decrypt  Private key is known by anyone who wants to send an encrypted message to the owner of the Public Key  Public key is used to decrypt these messages

Symmetric Algorithms  Faster but less secure than asymmetric  Each pair of users share a key  Data is encrypted with a key, transferred to another user and then decrypted by that user using the same key  The data could easily be decoded if the transfer is intercepted

How it works  Asymmetric Asymmetric scrambles the data--making in unretrevable. There are two keys, public and private Private is only held onto the receiver public is handed out to all who want to send a message only the private key can decrypt the message.

How it works - Pt. 2  Symmetric The symmetric system uses only 1 key to encrypt and decrypt the message. If someone where to get the key, the system fail and renders useless The advantage of using symmetric is that it takes up less time and space

How it Works Pt. 3  Data is passed through an algorithm (mathematical code) and is transformed into ciphertext (encrypted data)  This process takes place with the use of a key that you yourself provide  There are two types of algorithms used: Asymmetric and symmetric

How it works Pt. 4 - Asymmetric Algorithms  Complex but more secure than symmetric  Uses two different keys to encrypt and decrypt  Private key is known by anyone who wants to send an encrypted message to the owner of the Public Key  Public key is used to decrypt these messages

E-commerce security  All data sent over the servers are encrypted  all personal information is held in a one-way computer in a different network, guarded by firewalls.  All information is held encrypted in the server.  Only time the information is decrypted is when the user related to the information uses it.