0% found this document useful (0 votes)
2 views

MBA class and Internship Projects

The document discusses encryption as a technique for securing messages through algorithms, emphasizing its importance for confidentiality, integrity, and authentication. It differentiates between symmetric and asymmetric cryptography, detailing how each method utilizes keys for encryption and decryption. The document also highlights the need for user-friendly products tailored to the niche market of encryption and cryptography.

Uploaded by

salonisingh0404
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

MBA class and Internship Projects

The document discusses encryption as a technique for securing messages through algorithms, emphasizing its importance for confidentiality, integrity, and authentication. It differentiates between symmetric and asymmetric cryptography, detailing how each method utilizes keys for encryption and decryption. The document also highlights the need for user-friendly products tailored to the niche market of encryption and cryptography.

Uploaded by

salonisingh0404
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SENSITIVE DATA PRIVATE INFORMATION

DATA IN TRANSIT SECURITY OF


OVER NETWORKS COMMUNICATION

DATA STORED ON DATA STORED ON


STORAGE DEVICES COMPUTERS

Encryption, as name suggests, is generally a technique that


is used to conceal message using algorithms.
The time and difficulty of guessing information is what
makes encryption such a valuable security tool.
INTEGRITY
CONFIDENTIALITY AUTHENTICATION

proves the contents of


a message have not
encodes the been changed since it verifies the origin of
message's content. was sent. a message.
The science of
encrypting and
decrypting information
is called

The prefix means and


suffix means
AND HOW DOES IT WORK?
SYMMETRIC
CRYPTOGRAPHY

ASYMMETRIC
CRYPTOGRAPHY
ABSTRACT DESIGN
We believe people need Minimalist and easy to use
more products specifically
dedicated to this niche
market
The private key is faster than the public
It is slower than a private key.
key.

In this, the same key (secret key) and In public-key cryptography, two keys are
algorithm are used to encrypt and used, one key is used for encryption,
decrypt the message. and the other is used for decryption.

In private key cryptography, the key is In public-key cryptography, one of the


kept a secret. two keys is kept a secret.

The private key is Symmetrical The public key is Asymmetrical


ENCRYPTION vs CRYPTOGRAPHY

• principal application • art of creating codes


of cryptography. using techniques of
encryption and
• process of encoding decryption.
message or
information so that • study of techniques such
only authorized as encryption for secure
parties can have communication in
access to it. presence of third parties.
• Types of encryption • Types of cryptography
includes symmetric includes symmetric key
and asymmetric cryptography and
encryption. asymmetric key
cryptography.

You might also like