SlideShare a Scribd company logo
Encryption ppt
What is Encryption?
• Encryption is the process of encoding messages or
information in such a way that only authorized parties
can read it
• A process that converts original information, also called
plain text into a difficult-to-interpret form called
ciphertext
• Encryption does not of itself prevent interception, but
denies the message content to the interceptor
• Done by using an encryption algorithm, a formula used to
turn plain text into ciphertext.
What is Encryption?
Types of Encryption:
-Symmetric Key Encryption
-Asymmetric Key Encryption
Symmetric Key Encryption
• A secret key, is applied to the text of a message to change the
content in a particular way
• uses the same keys for both encryption of plaintext and
decryption of ciphertext.
• The keys may be identical or there may be a simple
transformation to go between the two keys.
• The keys, in practice, represent a shared secret between two
or more parties that can be used to maintain a private
information link
• both parties have access to the secret key which is one of the
main drawbacks of symmetric key encryption, in comparison
to asymmetric key encryption
Asymmetric Key Encryption
 Known as public-private key or public key encryption
 Uses key pairs for encrypting or decrypting data
 Public key is used to encrypt the data and private key is used
to decrypt the data
 Any message that is encrypted by using the private key can
only be decrypted by using the matching public key.
 It has ability to share secret data without sharing the same
encryption key
Asymmetric Key Encryption
Which one is better?
 Although, symmetric encryption is fast, it is not as safe as
asymmetric encryption because someone could steal the key
and decode the messages. But because of its speed, it's
commonly used for e-commerce transactions
 Asymmetric key encryption requires far more computation
to both encrypt and decrypt the content of the message. So,
the process takes longer. It has the ability to share the data
without sharing the same encryption key
Why use encryption?
• Authentication
• Protects personal data such as passwords.
• Privacy
• Provides for confidentiality of private information.
• Integrity
• Ensures that a document or file has not been altered.
• Accountability
• Prevents denial or plagiarism.
How prevalent is it?
 According to InformationWeek Research:
 Of 500 sites surveyed, two-thirds report using encryption to
protect company data.
 Of 500 companies surveyed, 43% use encryption on both
stored and transmitted data. More than three out of five
companies encrypt due to the threat of outsiders intercepting
sensitive data.
 Of 28% of sites surveyed, government regulation requires
encryption of stored and transmitted data.
 For 38% of companies, the complexity of the technology is an
obstacle.
Thank You
Ad

More Related Content

What's hot (20)

Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
OECLIB Odisha Electronics Control Library
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
Shubham Jain
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
Mijanur Rahman Milon
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Neha Bhambu
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 

Viewers also liked (20)

newmarketingplan_04-14-WEB
newmarketingplan_04-14-WEBnewmarketingplan_04-14-WEB
newmarketingplan_04-14-WEB
Susan Horak
 
González valentín presentación_competic2
González valentín presentación_competic2González valentín presentación_competic2
González valentín presentación_competic2
antonigau
 
CVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravuCVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravu
zugravu adrian
 
González valentín catàleg_competic2
González valentín catàleg_competic2González valentín catàleg_competic2
González valentín catàleg_competic2
antonigau
 
Medcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory ListMedcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory List
medcravepublisher
 
White Paper Organizational Design
White Paper Organizational DesignWhite Paper Organizational Design
White Paper Organizational Design
Pablo Borrero
 
Andrey Chebotarev, Head of UX Design в AltexSoft
Andrey Chebotarev, Head of UX Design в AltexSoftAndrey Chebotarev, Head of UX Design в AltexSoft
Andrey Chebotarev, Head of UX Design в AltexSoft
Alina Vilk
 
Solución del modelo de examen
Solución del modelo de examenSolución del modelo de examen
Solución del modelo de examen
Rosa Contramaestre
 
Buyer'sGuideIssuu
Buyer'sGuideIssuuBuyer'sGuideIssuu
Buyer'sGuideIssuu
Susan Horak
 
Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011
Tareq Alkh
 
Financial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual FrameworkFinancial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual Framework
Atif Ahmed
 
Impact of Risk Free and Risky Asset on Portfolio Return
Impact of Risk Free and  Risky Asset on Portfolio ReturnImpact of Risk Free and  Risky Asset on Portfolio Return
Impact of Risk Free and Risky Asset on Portfolio Return
Atif Ahmed
 
Praktek
PraktekPraktek
Praktek
bintangbb
 
Estres laboral en la industria colombiana
Estres laboral en la industria colombianaEstres laboral en la industria colombiana
Estres laboral en la industria colombiana
Jeisson Botina
 
My Invoice Finance
My Invoice FinanceMy Invoice Finance
My Invoice Finance
Mr Sean Husband
 
Aplikasi Gallery Pengetahuan
Aplikasi Gallery PengetahuanAplikasi Gallery Pengetahuan
Aplikasi Gallery Pengetahuan
rohmatulk
 
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
Ludovic ROLAND
 
Internet
InternetInternet
Internet
Anil Neupane
 
Metodos computarizados para resolver ecuaciones diferenciales
Metodos computarizados para resolver ecuaciones diferencialesMetodos computarizados para resolver ecuaciones diferenciales
Metodos computarizados para resolver ecuaciones diferenciales
Rosa Contramaestre
 
12 najpiękniejszych planerów wg Przedsiebiorcza.com
12 najpiękniejszych planerów wg Przedsiebiorcza.com12 najpiękniejszych planerów wg Przedsiebiorcza.com
12 najpiękniejszych planerów wg Przedsiebiorcza.com
Joanna Długa
 
newmarketingplan_04-14-WEB
newmarketingplan_04-14-WEBnewmarketingplan_04-14-WEB
newmarketingplan_04-14-WEB
Susan Horak
 
González valentín presentación_competic2
González valentín presentación_competic2González valentín presentación_competic2
González valentín presentación_competic2
antonigau
 
CVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravuCVTemplate_en_GB europass zugravu
CVTemplate_en_GB europass zugravu
zugravu adrian
 
González valentín catàleg_competic2
González valentín catàleg_competic2González valentín catàleg_competic2
González valentín catàleg_competic2
antonigau
 
Medcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory ListMedcrave Never Featured in Predatory List
Medcrave Never Featured in Predatory List
medcravepublisher
 
White Paper Organizational Design
White Paper Organizational DesignWhite Paper Organizational Design
White Paper Organizational Design
Pablo Borrero
 
Andrey Chebotarev, Head of UX Design в AltexSoft
Andrey Chebotarev, Head of UX Design в AltexSoftAndrey Chebotarev, Head of UX Design в AltexSoft
Andrey Chebotarev, Head of UX Design в AltexSoft
Alina Vilk
 
Solución del modelo de examen
Solución del modelo de examenSolución del modelo de examen
Solución del modelo de examen
Rosa Contramaestre
 
Buyer'sGuideIssuu
Buyer'sGuideIssuuBuyer'sGuideIssuu
Buyer'sGuideIssuu
Susan Horak
 
Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011Tareq Al Khawam Portfolio 2015-2011
Tareq Al Khawam Portfolio 2015-2011
Tareq Alkh
 
Financial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual FrameworkFinancial Sector Performance and Conceptual Framework
Financial Sector Performance and Conceptual Framework
Atif Ahmed
 
Impact of Risk Free and Risky Asset on Portfolio Return
Impact of Risk Free and  Risky Asset on Portfolio ReturnImpact of Risk Free and  Risky Asset on Portfolio Return
Impact of Risk Free and Risky Asset on Portfolio Return
Atif Ahmed
 
Estres laboral en la industria colombiana
Estres laboral en la industria colombianaEstres laboral en la industria colombiana
Estres laboral en la industria colombiana
Jeisson Botina
 
Aplikasi Gallery Pengetahuan
Aplikasi Gallery PengetahuanAplikasi Gallery Pengetahuan
Aplikasi Gallery Pengetahuan
rohmatulk
 
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
PAUG 03/05/2016 : Rechercher et analyser les fuites mémoires dans une applica...
Ludovic ROLAND
 
Metodos computarizados para resolver ecuaciones diferenciales
Metodos computarizados para resolver ecuaciones diferencialesMetodos computarizados para resolver ecuaciones diferenciales
Metodos computarizados para resolver ecuaciones diferenciales
Rosa Contramaestre
 
12 najpiękniejszych planerów wg Przedsiebiorcza.com
12 najpiękniejszych planerów wg Przedsiebiorcza.com12 najpiękniejszych planerów wg Przedsiebiorcza.com
12 najpiękniejszych planerów wg Przedsiebiorcza.com
Joanna Długa
 
Ad

Similar to Encryption ppt (20)

Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Raj Sampat
 
Fundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer SecurityFundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer Security
Uttara University
 
Encryption
Encryption Encryption
Encryption
Adnan Malak
 
Security
SecuritySecurity
Security
Sri Manakula Vinayagar Engineering College
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Computer Introduction (Data Encryption)-Lecture05
Computer Introduction (Data Encryption)-Lecture05Computer Introduction (Data Encryption)-Lecture05
Computer Introduction (Data Encryption)-Lecture05
Dr. Mazin Mohamed alkathiri
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Detailed description about the concept of E Commerce UNIT IV.pptx
Detailed description about the concept of E Commerce UNIT IV.pptxDetailed description about the concept of E Commerce UNIT IV.pptx
Detailed description about the concept of E Commerce UNIT IV.pptx
gstagra
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
ManishaJha43
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Information Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfnInformation Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfn
faiziikanwal47
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
UNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad InstituteUNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad Institute
SatishPise4
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
big data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help thisbig data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help this
warriorshanta
 
chapter 1-4.pdf
chapter 1-4.pdfchapter 1-4.pdf
chapter 1-4.pdf
zerihunnana
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
NithiShree5
 
Fundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer SecurityFundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer Security
Uttara University
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Computer Introduction (Data Encryption)-Lecture05
Computer Introduction (Data Encryption)-Lecture05Computer Introduction (Data Encryption)-Lecture05
Computer Introduction (Data Encryption)-Lecture05
Dr. Mazin Mohamed alkathiri
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Detailed description about the concept of E Commerce UNIT IV.pptx
Detailed description about the concept of E Commerce UNIT IV.pptxDetailed description about the concept of E Commerce UNIT IV.pptx
Detailed description about the concept of E Commerce UNIT IV.pptx
gstagra
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
ManishaJha43
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Information Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfnInformation Security 05- Encryption.pdfn
Information Security 05- Encryption.pdfn
faiziikanwal47
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
UNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad InstituteUNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad Institute
SatishPise4
 
Cryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptxCryptography and Network Security-ch1-4.pptx
Cryptography and Network Security-ch1-4.pptx
SamiDan3
 
big data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help thisbig data and Iot , its security part ,hoe yoy help this
big data and Iot , its security part ,hoe yoy help this
warriorshanta
 
information technology cryptography Msc chapter 1-4.pdf
information technology  cryptography Msc chapter 1-4.pdfinformation technology  cryptography Msc chapter 1-4.pdf
information technology cryptography Msc chapter 1-4.pdf
wondimagegndesta
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
NithiShree5
 
Ad

Recently uploaded (20)

Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 

Encryption ppt

  • 3. • Encryption is the process of encoding messages or information in such a way that only authorized parties can read it • A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext • Encryption does not of itself prevent interception, but denies the message content to the interceptor • Done by using an encryption algorithm, a formula used to turn plain text into ciphertext. What is Encryption?
  • 4. Types of Encryption: -Symmetric Key Encryption -Asymmetric Key Encryption
  • 5. Symmetric Key Encryption • A secret key, is applied to the text of a message to change the content in a particular way • uses the same keys for both encryption of plaintext and decryption of ciphertext. • The keys may be identical or there may be a simple transformation to go between the two keys. • The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link • both parties have access to the secret key which is one of the main drawbacks of symmetric key encryption, in comparison to asymmetric key encryption
  • 6. Asymmetric Key Encryption  Known as public-private key or public key encryption  Uses key pairs for encrypting or decrypting data  Public key is used to encrypt the data and private key is used to decrypt the data  Any message that is encrypted by using the private key can only be decrypted by using the matching public key.  It has ability to share secret data without sharing the same encryption key
  • 8. Which one is better?  Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could steal the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions  Asymmetric key encryption requires far more computation to both encrypt and decrypt the content of the message. So, the process takes longer. It has the ability to share the data without sharing the same encryption key
  • 9. Why use encryption? • Authentication • Protects personal data such as passwords. • Privacy • Provides for confidentiality of private information. • Integrity • Ensures that a document or file has not been altered. • Accountability • Prevents denial or plagiarism.
  • 10. How prevalent is it?  According to InformationWeek Research:  Of 500 sites surveyed, two-thirds report using encryption to protect company data.  Of 500 companies surveyed, 43% use encryption on both stored and transmitted data. More than three out of five companies encrypt due to the threat of outsiders intercepting sensitive data.  Of 28% of sites surveyed, government regulation requires encryption of stored and transmitted data.  For 38% of companies, the complexity of the technology is an obstacle.