Presentation is loading. Please wait.

Presentation is loading. Please wait.

Basic Encryption: methods and tools

Similar presentations


Presentation on theme: "Basic Encryption: methods and tools"— Presentation transcript:

1 Basic Encryption: methods and tools
Steven Geisel

2 Today’s Plan Introduction What is Encryption? History of Cryptography
Methods of Cryptography Practical Uses of Encryption Current Tool Demonstration

3 What is Encryption? Converting data into a form called “ciphertext”
Then cannot be easily understood by adversaries Utilizes special keys or methods to be able to understand the “ciphertext” Cryptography - Secret Message Decryption – Process of converting “ciphertext” back into original form

4 Encryption (cont’d)

5 History of Cryptography
Dates back to 4000 years ago Earliest form was simply writing a message Transposition Ciphers (basis for many modern-day techniques Caesar Cipher Poly Alphabetic (decoder rings)

6 Methods of Cryptography
What is the best way to encrypt your data? Should we be taking extra precautions in order to protect our data? Are virus protections and other basic methods of protection (Microsoft security essentials) safe enough?

7 Practical Uses of Encryption
Evolution of Digital World caused data insecurity Newer, more secure methods invented DES (Data Encryption Standard) – symmetric block 64 bit, same key for encryption and decryption PGP (Pretty Good Privacy) – combination of hashing, data compression, and symmetric key cryptography Asymmetric Cryptography – utilizes the public-private key method in order to obtain two levels of security for each encryption and decryption

8 Encryption Tools Microsoft’s Encrypting File System TrueCrypt AxCrypt
Pro – Integrates directly with Windows Con – Slows down the opening of the encrypted files TrueCrypt Pro – “On-the-fly-encryption”, ability to encrypt entire drive or single files, Windows + Mac OS Con – Virtual drive system difficult to understand during first use AxCrypt Pro – Integrates directly with Windows, ultra portable Con – Uses passphrase to utilize the tool (single authentication)

9 Encryption Tools (cont’d)

10 Encryption Tools (cont’d)

11 Encryption Tools (cont’d)

12 Questions

13 Sources http://searchsecurity.techtarget.com/definition/encryption


Download ppt "Basic Encryption: methods and tools"

Similar presentations


Ads by Google