Presentation is loading. Please wait.

Presentation is loading. Please wait.

Topic 1: Data, information, knowledge and processing

Similar presentations


Presentation on theme: "Topic 1: Data, information, knowledge and processing"— Presentation transcript:

1 Topic 1: Data, information, knowledge and processing
Encryption

2 Learning Objectives Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

3 What is data encryption?
Encryption is the process of converting information into a form that is meaningless to anyone except holders of a ‘key’. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

4 What is plain text? In cryptography, plaintext is ordinary readable text before being encrypted into ‘ciphertext’ or after being decrypted Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

5 Symmetric Key Encryption
First, Alice needs to generate a secret ‘key’ using encryption software. The key is usually a very long, random number. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

6 Symmetric Key Encryption
Alice can send Bob the encrypted text, but Bob cannot read it yet Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

7 Symmetric Key Encryption
Alice can send Bob the encrypted text, but Bob cannot read it yet Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

8 Symmetric Key Encryption
Alice must then give a copy of this key to Bob. She must make sure that nobody else can get the key (USB stick) Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

9 Symmetric Key Encryption
Now Bob has the key he can use special software to decrypt the message. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

10 Asymmetric Key Encryption
Works exactly the same. However there are 2 possible keys: Public key is made freely available to anyone who might want to send you a message. Private key is kept secret, so that only you know it. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

11 Asymmetric Key Encryption
Any message encrypted by the public key can only be decrypted by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

12 How can encryption protect data in an e-mail?
It can ‘scramble’ the , and only the intended recipient can de-scramble it. Therefore sensitive information can be locked away. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

13 How can encryption protect data on a hard disk?
It can protect sensitive information contained on the disk. Bank Records Personal Information Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

14 How can encryption protect data in on an HTTPS websites
Any information sent by a web-browser to a web server, or the other way, can be encrypted, so that no-one can intercept the information. Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)

15 Exam Questions Define encryption and describe different methods of encryption (including: symmetric, asymmetric, public key, private key)


Download ppt "Topic 1: Data, information, knowledge and processing"

Similar presentations


Ads by Google