Presentation is loading. Please wait.

Presentation is loading. Please wait.

ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used.

Similar presentations


Presentation on theme: "ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used."— Presentation transcript:

1 ENCRYPTION Alex Piercey Erica Reid

2 What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used on computers  Is used in hopping, banking,  A secure server begins with https, rather then http

3 History of Encryption  Intaglio was the first use of encryption  Was a collage of images and text  only the trader knows how to read the text  the public couldn’t read the text  The collage of images and text was also used to identify themselves to the public this is what we call today as “digital signature”  “666” was implied as a encrypted message  ancient recipes where even encrypted to protect from "stealing" them for commercial value

4 History of Encryption - In War  WW2 Germans and US both sent messages encrypted  Mathematician Marian Rejewski at the Polands Cipher Bureau decrypted the encryption code.  This was considered the greatest cryptanalysis breakthrough within a thousand years.

5 Asymmetric Algorithms  Complex but more secure than symmetric  Uses two different keys to encrypt and decrypt  Private key is known by anyone who wants to send an encrypted message to the owner of the Public Key  Public key is used to decrypt these messages

6 Symmetric Algorithms  Faster but less secure than asymmetric  Each pair of users share a key  Data is encrypted with a key, transferred to another user and then decrypted by that user using the same key  The data could easily be decoded if the transfer is intercepted

7 How it works  Asymmetric Asymmetric scrambles the data--making in unretrevable. There are two keys, public and private Private is only held onto the receiver public is handed out to all who want to send a message only the private key can decrypt the message.

8 How it works - Pt. 2  Symmetric The symmetric system uses only 1 key to encrypt and decrypt the message. If someone where to get the key, the system fail and renders useless The advantage of using symmetric is that it takes up less time and space

9 How it Works Pt. 3  Data is passed through an algorithm (mathematical code) and is transformed into ciphertext (encrypted data)  This process takes place with the use of a key that you yourself provide  There are two types of algorithms used: Asymmetric and symmetric

10 How it works Pt. 4 - Asymmetric Algorithms  Complex but more secure than symmetric  Uses two different keys to encrypt and decrypt  Private key is known by anyone who wants to send an encrypted message to the owner of the Public Key  Public key is used to decrypt these messages

11 E-commerce security  All data sent over the servers are encrypted  all personal information is held in a one-way computer in a different network, guarded by firewalls.  All information is held encrypted in the server.  Only time the information is decrypted is when the user related to the information uses it.


Download ppt "ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used."

Similar presentations


Ads by Google