SlideShare a Scribd company logo
Encryption
• Encryption is a fundamental technique used in information
security
to protect the confidentiality and integrity of data.
• It involves the process of converting plain text or data
into an encoded form called ciphertext, which can only
be accessed and understood by authorized parties with the
corresponding decryption key.
Encryption
cont… Key
Terms
• Cryptography comes from the Greek words kryptos,
meaning “hidden,”
and graphein, meaning “to write,” and involves making and using
codes to secure messages.
• Cryptanalysis involves cracking or breaking encrypted
messages back into their unencrypted origins.
• Cryptography uses mathematical algorithms that are usually known to
all.
Encryption
cont… Key
Terms
• After all, cryptography is not the knowledge of the algorithm
that
protects the encrypted message, it’s the knowledge of the
key, a series of characters or bits injected into the
algorithm along with the original message to create the
encrypted message.
Encryption
cont… Key
Terms
• Cipher: When used as a verb, the transformation of the
individual components (characters, bytes, or bits) of an
unencrypted message into encrypted components or vice
versa;
• Cipher: When used as a noun, the process of encryption
or the algorithm used in encryption, and a term
synonymous with cryptosystem.
Encryption
cont… Key
Terms
• Encryption(Encipher):The process of
converting
an
origin
al
message (plaintext) into a form that cannot be used by
unauthorized
individuals (ciphertext). Also referred to as enciphering.
• Encryption renders the data contents to unreadable and
inaccessible form, unless one have the decryption key.
Encryption
cont… Key
Terms
• Decryption (Decipher): The process of converting an
encoded or enciphered message (ciphertext) back to its
original readable form (plaintext). Also referred to as
deciphering.
• Decryption requires two elements: the correct
password and the
corresponding decryption algorithm.
Encryption
cont… Key
Terms
• Plaintext or cleartext: is an
unencrypted, readable, plain message
that anyone can read.
• Ciphertext: is the result of the encryption process.
• The encrypted plaintext appears as
apparently random strings of characters.
Encryption
cont… Key
Terms
• Algorithm: The mathematical formula or method used to
convert an
unencrypted message into an encrypted message.
• This sometimes refers to the programs that enable the
cryptographic processes.
• Code: The process of converting components (words/
phrases) of an
unencrypted message into encrypted components.
Encryption
cont… Key
Terms
• Bit stream cipher: An encryption method that involves
converting plaintext to ciphertext one bit at a time.
• Block cipher: An encryption method that involves
dividing the plaintext into blocks or sets of bits and then
converting the plaintext to ciphertext one block at a time.
Encryption
cont… Key
Terms
• Key or cryptovariable: The information used in conjunction
with the algorithm to create the ciphertext from the
plaintext; it can be a series of bits used in a
mathematical algorithm or the knowledge of how to
manipulate the plaintext.
• Key tells the algorithm how to transform the plaintext into
ciphertext.
Encryption
cont… Key
Terms
• Kerckhoffs's principle states that “only
secrecy of the key provides security”.
• Another law states that: “encrypted data is only as
secure as its decryption key”.
• These statements influence the role of encryption, and keys.
Encryption
cont… Key
Terms
• Keeping the details of an entire
encryption
algorithm secret
is
extremely difficult; keeping a much smaller key secret is
easier.
• The key locks and unlocks the algorithm, allowing the
encryption or decryption process to function.
• Keyspace: The entire range of values that can be used to
construct an individual key.
Encryption
cont… Key
Terms
• Link encryption: A series of encryptions and decryptions
between a number of systems, wherein each system in
a network decrypts the message sent to it and then
reencrypts the message using different keys and sends it
to the next neighbor.
• This process continues until the message reaches the
final destination.
Encryption
cont… Key
Terms
• Steganography: The process of hiding messages; for
example, hiding a message within the digital encoding
of a picture or graphic so that it is almost impossible to
detect that the hidden message even exists.
• Work factor: The amount of effort (usually expressed in units
of time)
required to perform cryptanalysis on an encoded message.
Encryption
cont… Key
Terms
• Hash: When a website encrypts your password, it uses an
encryption algorithm to convert your plaintext password to a
hash.
• A hash is different from encryption in that once the data is
hashed, it cannot be unhashed. Or rather, it is extremely
difficult.
• Hashing is really useful when you need to verify
Encryption
cont… Key
Terms
• Symmetric and Asymmetric Algorithms:
two primary encryption
algorithm types: symmetric and asymmetric.
• They both encrypt data, but function in a slightly different
manner.
Encryption
cont… Key
Terms
• Symmetric algorithm: Also known as
secret-key encryption, private
Key encryption or shared-key encryption.
• Uses the same key for both encryption and decryption.
• Both parties must agreeon the algorithm key before
commencing communication.
Encryption
cont… Key
Terms
• Symmetric Encryption Algorithms types: 8. RC6
1. Advanced Encryption Standard (AES) 9. Serpent
2. Data Encryption Standard (DES) 10. Camellia
3. Triple Data Encryption Standard (3DES) 11. CAST-
128
4. Blowfish 12. CAST-
256
5. Twofish 13. IDEA
6. RC4 14. SEED
7. RC5 15. Skipjack
Encryption
cont… Key
Terms
• Advanced Encryption
Standard (AES): A widely
use
d
symmetri
c
encryption algorithm known for its security and
efficiency.
• It supports key sizes of 128, 192, or 256 bits.
Encryption
cont… Key
Terms
• Data Encryption Standard (DES): An
older symmetric encryption
algorithm that uses a 56-bit key.
• While DES is considered less secure by today's standards, it
still finds some limited use.
Encryption
cont… Key
Terms
• Triple Data Encryption Standard (3DES): It applies the DES
algorithm
three times to each data block, providinga higher level of
security than DES.
• 3DES supports key sizes of 112 or 168 bits.
Encryption
cont… Key
Terms
Encryption
cont… Key
Terms
Average Time Required for Exhaustive Key Search
Encryption
cont… Key
Terms
• Asymmetric algorithm: Also known as public-key
encryption.
• Uses two different keys: a public key and a private
key.
• This enables secure encryptionwhile
communicating previously establishing a mutual
algorithm.
without
• This is also known as public key
cryptology.
Encryption
cont… Key
Terms
• Asymmetric Encryption Algorithms:
1. Rivest-Shamir-Adleman (RSA)
2. Elliptic Curve Cryptography
(ECC)
3. Diffie-Hellman (DH)
4. Digital Signature Algorithm
(DSA)
5. ElGamal
6. Paillier
7. McEliece
8. NTRU
9. Lattice-based encryption
algorithms
a. Learning With Errors (LWE)
b. Ring Learning With Errors (RLWE)
c. NTRU Prime
a.
b.
a.
b.
c.
d.
e.
f.
10. Merkle-Damgård-based Signature
Scheme
(MSS)
11. RSA-KEM
12. Identity-Based Encryption (IBE)
13. Attribute-Based Encryption (ABE)
14. Homomorphic Encryption
Partially Homomorphic
Encryption Fully Homomorphic
Encryption
15. Post-Quantum Cryptography (PQC)
algorithms (designed to resist attacks by
quantum computers)
Code-based
Cryptography Lattice-
based Cryptography
Multivariate
Cryptography
Supersingular Isogeny Diffie-Hellman
(SIDH) Hash-based Cryptography
Encryption
cont… Key
Terms
• Rivest-Shamir-Adleman (RSA):
One of the
asymmetric encryption algorithms.
mos
t
widel
y
use
d
• It usesthe conceptof public and private key pairs,with
encryption
performed using the public key and decryption using the
corresponding private key.
Encryption
cont… Key
Terms
• Elliptic Curve Cryptography (ECC): An
asymmetric
encryptio
n
algorithm that is gainingpopularity due to its strong security with
shorter key lengths compared to RSA.
• ECC uses the mathematical properties of elliptic curves for
encryption and decryption.
Encryption
cont… Key
Terms
• Diffie-Hellman (DH): Although notstrictly an
encryption algorithm,
Diffie-Hellman is a key exchangeprotocol used in
asymmetric encryption systems.
• It allows two parties to securely establish a shared secret key
over an insecure channel.
Encryption
cont… Key
Terms
• Public and Private Keys: Now we understand more about the
function of
keys in the encryption process, we can look at public and private
keys.
• An asymmetric algorithm uses two keys: a public key and a private
key.
• The public key can be sent to other people, while the private
key is only known by the owner. What's the purpose of this?
Encryption
cont… Key
Terms
• Well, anyone with the intended recipient's public key can
encrypt a
private message for them, while the recipient can only
read the contents of that message provided they have
access to the paired private key.
Encryption
cont… Key
Terms
Encryption
cont… Key
Terms
• Public and private keys also play an
essential
role in
digital
signatures, whereby a sender can sign their message
with their
private encryption key.
• Those with the public key can then verify the message,
safe in the knowledge that the original message came
from the sender's private key.
Encryption
cont… Key
Terms
• Public and private keys also play an essential role in digital signatures,
whereby a
sender can sign their message with their private encryption key.
• Those with the public key can then verify the message, safe in the
knowledge that the original message came from the sender's private
key.
• A key pair is the mathematically linked public and private key generated
by an encryption algorithm.
Encryption
cont… Key
Terms
• HTTPS: Hyper Text Transfer Protocol Secure (HTTPS) is a
now widely
implemented security upgrade for the HTTP application protocol
that is a foundation of the internet as we know it.
• When using a HTTPS connection, your data
is encrypted using
Transport Layer Security (TLS), protecting your data while in
transit.
Encryption
cont… Key
Terms
• HTTPS generates long-term private and public keys that in
turn
are
used to create a short-term session key.
• The session key is a single-use symmetric key that the
connection destroys once you leave the HTTPS site
(closing the connection and ending its encryption).
Encryption
cont… Key
Terms
• However,when you revisitthe site,you will receiveanother single-
use
session key to secure your communication.
• A site must completely follow to HTTPS to offer users complete
security.
• Since 2018 the majority of sites online began offering HTTPS
connections over standard HTTP.
Encryption
cont… Key
Terms
• End-to-End Encryption: One of
the biggestencryption buzzwordsis
that of end-to-end encryption.
• Social messaging platform service WhatsApp began offering its
users end-to-end encryption (E2EE) in 2016, making sure
their messages are private at all times.
Encryption
cont… Key
Terms
• In the context of a messaging service, EE2E means that once
you hit
the send button, the encryption remains in place until the
recipient receives the messages.
• Well, this means that the private key used for encoding and
decoding your messages never leaves your device, in
turn ensuring that no one but you can send messages using
Ad

More Related Content

Similar to Information Security 05- Encryption.pdfn (20)

UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Raj Sampat
 
Security
SecuritySecurity
Security
Sri Manakula Vinayagar Engineering College
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
VAIBHAVCHAKRAWARTI
 
Cryptography
CryptographyCryptography
Cryptography
Muhammad Shoaib Saleem
 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
MikiAbera
 
Basics of Cryptography presentation.pptx
Basics of Cryptography presentation.pptxBasics of Cryptography presentation.pptx
Basics of Cryptography presentation.pptx
sreepriyap9
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Data Science Unit 02 SPPU Sem 6  PPT-2.pdfData Science Unit 02 SPPU Sem 6  PPT-2.pdf
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
ThejasviniBoorla
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Introduction to Cryptography for btech cse
Introduction to Cryptography for btech cseIntroduction to Cryptography for btech cse
Introduction to Cryptography for btech cse
mahesh64847
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
UNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad InstituteUNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad Institute
SatishPise4
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Fundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital AgeFundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
Encryption
EncryptionEncryption
Encryption
Savyasachi14
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
VAIBHAVCHAKRAWARTI
 
Chapter 2 part 1.ppt
Chapter 2 part 1.pptChapter 2 part 1.ppt
Chapter 2 part 1.ppt
MikiAbera
 
Basics of Cryptography presentation.pptx
Basics of Cryptography presentation.pptxBasics of Cryptography presentation.pptx
Basics of Cryptography presentation.pptx
sreepriyap9
 
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
Data Science Unit 02 SPPU Sem 6  PPT-2.pdfData Science Unit 02 SPPU Sem 6  PPT-2.pdf
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
ThejasviniBoorla
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Introduction to Cryptography for btech cse
Introduction to Cryptography for btech cseIntroduction to Cryptography for btech cse
Introduction to Cryptography for btech cse
mahesh64847
 
UNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad InstituteUNIT 3 Information Security Sharad Institute
UNIT 3 Information Security Sharad Institute
SatishPise4
 
Cryptography : The Art of Secured Messaging
Cryptography : The Art of Secured MessagingCryptography : The Art of Secured Messaging
Cryptography : The Art of Secured Messaging
Sumit Satam
 
Fundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital AgeFundamentals of Cryptography: Securing Data in the Digital Age
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
skknowledge
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 

More from faiziikanwal47 (18)

01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
faiziikanwal47
 
Cloud Computing Models.uututuutututtuutut
Cloud Computing Models.uututuutututtuututCloud Computing Models.uututuutututtuutut
Cloud Computing Models.uututuutututtuutut
faiziikanwal47
 
1602984149-1-introduction.pptx4hjdqehjeg
1602984149-1-introduction.pptx4hjdqehjeg1602984149-1-introduction.pptx4hjdqehjeg
1602984149-1-introduction.pptx4hjdqehjeg
faiziikanwal47
 
1602984229-2-req-engg-process.pptxj89009
1602984229-2-req-engg-process.pptxj890091602984229-2-req-engg-process.pptxj89009
1602984229-2-req-engg-process.pptxj89009
faiziikanwal47
 
lecture9-190719030941 globalized availab
lecture9-190719030941 globalized availablecture9-190719030941 globalized availab
lecture9-190719030941 globalized availab
faiziikanwal47
 
Ch5 System modeling globally availabless
Ch5 System modeling globally availablessCh5 System modeling globally availabless
Ch5 System modeling globally availabless
faiziikanwal47
 
Information Security 20- Risk Assessment.pdf
Information Security 20- Risk Assessment.pdfInformation Security 20- Risk Assessment.pdf
Information Security 20- Risk Assessment.pdf
faiziikanwal47
 
Information Security 16- Information Flow.pdf
Information Security 16- Information Flow.pdfInformation Security 16- Information Flow.pdf
Information Security 16- Information Flow.pdf
faiziikanwal47
 
Information Security 10- Network Security.pdf
Information Security 10- Network Security.pdfInformation Security 10- Network Security.pdf
Information Security 10- Network Security.pdf
faiziikanwal47
 
Information Security 07- Audit.pdnjn;pp[pf
Information Security 07- Audit.pdnjn;pp[pfInformation Security 07- Audit.pdnjn;pp[pf
Information Security 07- Audit.pdnjn;pp[pf
faiziikanwal47
 
Information Security 06- Hashing and Digital Signatures.pdf
Information Security 06- Hashing and Digital Signatures.pdfInformation Security 06- Hashing and Digital Signatures.pdf
Information Security 06- Hashing and Digital Signatures.pdf
faiziikanwal47
 
information security Lecture by cyber security
information security Lecture by  cyber securityinformation security Lecture by  cyber security
information security Lecture by cyber security
faiziikanwal47
 
market side business mind side to get enough
market side business mind side to get enoughmarket side business mind side to get enough
market side business mind side to get enough
faiziikanwal47
 
information security by cryptography sid
information security by cryptography sidinformation security by cryptography sid
information security by cryptography sid
faiziikanwal47
 
Information Security (Protection Model _ Access Control ).pdf
Information Security (Protection Model _ Access Control ).pdfInformation Security (Protection Model _ Access Control ).pdf
Information Security (Protection Model _ Access Control ).pdf
faiziikanwal47
 
Information Security 08- Intrusion Detection and Response (1).pdf
Information Security 08- Intrusion Detection and Response (1).pdfInformation Security 08- Intrusion Detection and Response (1).pdf
Information Security 08- Intrusion Detection and Response (1).pdf
faiziikanwal47
 
12Outlier.for software introductionalism
12Outlier.for software introductionalism12Outlier.for software introductionalism
12Outlier.for software introductionalism
faiziikanwal47
 
CurrieTesting. in engineering field relevant
CurrieTesting. in engineering field relevantCurrieTesting. in engineering field relevant
CurrieTesting. in engineering field relevant
faiziikanwal47
 
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
faiziikanwal47
 
Cloud Computing Models.uututuutututtuutut
Cloud Computing Models.uututuutututtuututCloud Computing Models.uututuutututtuutut
Cloud Computing Models.uututuutututtuutut
faiziikanwal47
 
1602984149-1-introduction.pptx4hjdqehjeg
1602984149-1-introduction.pptx4hjdqehjeg1602984149-1-introduction.pptx4hjdqehjeg
1602984149-1-introduction.pptx4hjdqehjeg
faiziikanwal47
 
1602984229-2-req-engg-process.pptxj89009
1602984229-2-req-engg-process.pptxj890091602984229-2-req-engg-process.pptxj89009
1602984229-2-req-engg-process.pptxj89009
faiziikanwal47
 
lecture9-190719030941 globalized availab
lecture9-190719030941 globalized availablecture9-190719030941 globalized availab
lecture9-190719030941 globalized availab
faiziikanwal47
 
Ch5 System modeling globally availabless
Ch5 System modeling globally availablessCh5 System modeling globally availabless
Ch5 System modeling globally availabless
faiziikanwal47
 
Information Security 20- Risk Assessment.pdf
Information Security 20- Risk Assessment.pdfInformation Security 20- Risk Assessment.pdf
Information Security 20- Risk Assessment.pdf
faiziikanwal47
 
Information Security 16- Information Flow.pdf
Information Security 16- Information Flow.pdfInformation Security 16- Information Flow.pdf
Information Security 16- Information Flow.pdf
faiziikanwal47
 
Information Security 10- Network Security.pdf
Information Security 10- Network Security.pdfInformation Security 10- Network Security.pdf
Information Security 10- Network Security.pdf
faiziikanwal47
 
Information Security 07- Audit.pdnjn;pp[pf
Information Security 07- Audit.pdnjn;pp[pfInformation Security 07- Audit.pdnjn;pp[pf
Information Security 07- Audit.pdnjn;pp[pf
faiziikanwal47
 
Information Security 06- Hashing and Digital Signatures.pdf
Information Security 06- Hashing and Digital Signatures.pdfInformation Security 06- Hashing and Digital Signatures.pdf
Information Security 06- Hashing and Digital Signatures.pdf
faiziikanwal47
 
information security Lecture by cyber security
information security Lecture by  cyber securityinformation security Lecture by  cyber security
information security Lecture by cyber security
faiziikanwal47
 
market side business mind side to get enough
market side business mind side to get enoughmarket side business mind side to get enough
market side business mind side to get enough
faiziikanwal47
 
information security by cryptography sid
information security by cryptography sidinformation security by cryptography sid
information security by cryptography sid
faiziikanwal47
 
Information Security (Protection Model _ Access Control ).pdf
Information Security (Protection Model _ Access Control ).pdfInformation Security (Protection Model _ Access Control ).pdf
Information Security (Protection Model _ Access Control ).pdf
faiziikanwal47
 
Information Security 08- Intrusion Detection and Response (1).pdf
Information Security 08- Intrusion Detection and Response (1).pdfInformation Security 08- Intrusion Detection and Response (1).pdf
Information Security 08- Intrusion Detection and Response (1).pdf
faiziikanwal47
 
12Outlier.for software introductionalism
12Outlier.for software introductionalism12Outlier.for software introductionalism
12Outlier.for software introductionalism
faiziikanwal47
 
CurrieTesting. in engineering field relevant
CurrieTesting. in engineering field relevantCurrieTesting. in engineering field relevant
CurrieTesting. in engineering field relevant
faiziikanwal47
 
Ad

Recently uploaded (20)

Traffic Pedestrian Shopping Functions.pptx
Traffic Pedestrian Shopping Functions.pptxTraffic Pedestrian Shopping Functions.pptx
Traffic Pedestrian Shopping Functions.pptx
lllllwlwwwjw
 
SM John deere 4x2 and 4x6 gator repair manual (tm1518).pdf
SM John deere 4x2 and 4x6 gator repair manual (tm1518).pdfSM John deere 4x2 and 4x6 gator repair manual (tm1518).pdf
SM John deere 4x2 and 4x6 gator repair manual (tm1518).pdf
Service Repair Manual
 
PLC TECHNICIAN HANDBOOK beginners in automation
PLC TECHNICIAN HANDBOOK beginners in automationPLC TECHNICIAN HANDBOOK beginners in automation
PLC TECHNICIAN HANDBOOK beginners in automation
dhruvakumarkEC032
 
Drive Zone - Your Ultimate Car Companion.pptx
Drive Zone - Your Ultimate Car Companion.pptxDrive Zone - Your Ultimate Car Companion.pptx
Drive Zone - Your Ultimate Car Companion.pptx
fazzfasil46
 
book_data_strategy_thesolution desght menothly
book_data_strategy_thesolution desght menothlybook_data_strategy_thesolution desght menothly
book_data_strategy_thesolution desght menothly
santosh162
 
THE PROGRAMMABLE LOGIC CONTROLLER (PLC )
THE PROGRAMMABLE LOGIC CONTROLLER (PLC )THE PROGRAMMABLE LOGIC CONTROLLER (PLC )
THE PROGRAMMABLE LOGIC CONTROLLER (PLC )
omarkhaled681127
 
Dhl tasmim .pptx_20250428_033108_0000.pptx
Dhl tasmim .pptx_20250428_033108_0000.pptxDhl tasmim .pptx_20250428_033108_0000.pptx
Dhl tasmim .pptx_20250428_033108_0000.pptx
mohammadshuvoislam7
 
Tx 4x2 Service Manual John Deere Gator.pdf
Tx 4x2 Service Manual John Deere Gator.pdfTx 4x2 Service Manual John Deere Gator.pdf
Tx 4x2 Service Manual John Deere Gator.pdf
Service Repair Manual
 
John Deere E130, E140, E150 Repair Guide.pdf
John Deere E130, E140, E150 Repair Guide.pdfJohn Deere E130, E140, E150 Repair Guide.pdf
John Deere E130, E140, E150 Repair Guide.pdf
Service Repair Manual
 
XUV825E service manual download Repair Pdf
XUV825E service manual download Repair PdfXUV825E service manual download Repair Pdf
XUV825E service manual download Repair Pdf
Service Repair Manual
 
John Deere E100, E110, E120 Service manual.pdf
John Deere E100, E110, E120 Service manual.pdfJohn Deere E100, E110, E120 Service manual.pdf
John Deere E100, E110, E120 Service manual.pdf
Service Repair Manual
 
caterpillar 65 challenger service manual
caterpillar 65 challenger service manualcaterpillar 65 challenger service manual
caterpillar 65 challenger service manual
robert santiago
 
caterpillar 323f l excavator service manual
caterpillar 323f l excavator service manualcaterpillar 323f l excavator service manual
caterpillar 323f l excavator service manual
robert santiago
 
Hot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t Skip
Hot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t SkipHot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t Skip
Hot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t Skip
Motronix
 
Electrical and Electronic Systems (1).ppt
Electrical and Electronic Systems (1).pptElectrical and Electronic Systems (1).ppt
Electrical and Electronic Systems (1).ppt
AnisElghadi2
 
Service Manual John Deere Gator 6x4 download.pdf
Service Manual John Deere Gator 6x4 download.pdfService Manual John Deere Gator 6x4 download.pdf
Service Manual John Deere Gator 6x4 download.pdf
Service Repair Manual
 
automatic hammer machine FOR MAJOR PROJECT .pptx
automatic hammer machine FOR MAJOR PROJECT .pptxautomatic hammer machine FOR MAJOR PROJECT .pptx
automatic hammer machine FOR MAJOR PROJECT .pptx
jeenautsav254
 
Protect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer Heat
Protect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer HeatProtect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer Heat
Protect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer Heat
Ultimate Bimmer Services
 
Download New Holland E75CSR workshop manual with troubleshooting.pdf
Download New Holland E75CSR workshop manual with troubleshooting.pdfDownload New Holland E75CSR workshop manual with troubleshooting.pdf
Download New Holland E75CSR workshop manual with troubleshooting.pdf
Service Repair Manual
 
美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办
美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办
美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办
Taqyea
 
Traffic Pedestrian Shopping Functions.pptx
Traffic Pedestrian Shopping Functions.pptxTraffic Pedestrian Shopping Functions.pptx
Traffic Pedestrian Shopping Functions.pptx
lllllwlwwwjw
 
SM John deere 4x2 and 4x6 gator repair manual (tm1518).pdf
SM John deere 4x2 and 4x6 gator repair manual (tm1518).pdfSM John deere 4x2 and 4x6 gator repair manual (tm1518).pdf
SM John deere 4x2 and 4x6 gator repair manual (tm1518).pdf
Service Repair Manual
 
PLC TECHNICIAN HANDBOOK beginners in automation
PLC TECHNICIAN HANDBOOK beginners in automationPLC TECHNICIAN HANDBOOK beginners in automation
PLC TECHNICIAN HANDBOOK beginners in automation
dhruvakumarkEC032
 
Drive Zone - Your Ultimate Car Companion.pptx
Drive Zone - Your Ultimate Car Companion.pptxDrive Zone - Your Ultimate Car Companion.pptx
Drive Zone - Your Ultimate Car Companion.pptx
fazzfasil46
 
book_data_strategy_thesolution desght menothly
book_data_strategy_thesolution desght menothlybook_data_strategy_thesolution desght menothly
book_data_strategy_thesolution desght menothly
santosh162
 
THE PROGRAMMABLE LOGIC CONTROLLER (PLC )
THE PROGRAMMABLE LOGIC CONTROLLER (PLC )THE PROGRAMMABLE LOGIC CONTROLLER (PLC )
THE PROGRAMMABLE LOGIC CONTROLLER (PLC )
omarkhaled681127
 
Dhl tasmim .pptx_20250428_033108_0000.pptx
Dhl tasmim .pptx_20250428_033108_0000.pptxDhl tasmim .pptx_20250428_033108_0000.pptx
Dhl tasmim .pptx_20250428_033108_0000.pptx
mohammadshuvoislam7
 
Tx 4x2 Service Manual John Deere Gator.pdf
Tx 4x2 Service Manual John Deere Gator.pdfTx 4x2 Service Manual John Deere Gator.pdf
Tx 4x2 Service Manual John Deere Gator.pdf
Service Repair Manual
 
John Deere E130, E140, E150 Repair Guide.pdf
John Deere E130, E140, E150 Repair Guide.pdfJohn Deere E130, E140, E150 Repair Guide.pdf
John Deere E130, E140, E150 Repair Guide.pdf
Service Repair Manual
 
XUV825E service manual download Repair Pdf
XUV825E service manual download Repair PdfXUV825E service manual download Repair Pdf
XUV825E service manual download Repair Pdf
Service Repair Manual
 
John Deere E100, E110, E120 Service manual.pdf
John Deere E100, E110, E120 Service manual.pdfJohn Deere E100, E110, E120 Service manual.pdf
John Deere E100, E110, E120 Service manual.pdf
Service Repair Manual
 
caterpillar 65 challenger service manual
caterpillar 65 challenger service manualcaterpillar 65 challenger service manual
caterpillar 65 challenger service manual
robert santiago
 
caterpillar 323f l excavator service manual
caterpillar 323f l excavator service manualcaterpillar 323f l excavator service manual
caterpillar 323f l excavator service manual
robert santiago
 
Hot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t Skip
Hot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t SkipHot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t Skip
Hot Weather, Smooth Performance Audi Q5 Transmission Services You Can’t Skip
Motronix
 
Electrical and Electronic Systems (1).ppt
Electrical and Electronic Systems (1).pptElectrical and Electronic Systems (1).ppt
Electrical and Electronic Systems (1).ppt
AnisElghadi2
 
Service Manual John Deere Gator 6x4 download.pdf
Service Manual John Deere Gator 6x4 download.pdfService Manual John Deere Gator 6x4 download.pdf
Service Manual John Deere Gator 6x4 download.pdf
Service Repair Manual
 
automatic hammer machine FOR MAJOR PROJECT .pptx
automatic hammer machine FOR MAJOR PROJECT .pptxautomatic hammer machine FOR MAJOR PROJECT .pptx
automatic hammer machine FOR MAJOR PROJECT .pptx
jeenautsav254
 
Protect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer Heat
Protect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer HeatProtect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer Heat
Protect Your Mini Cooper Engine Expert Coolant Service Tips for the Summer Heat
Ultimate Bimmer Services
 
Download New Holland E75CSR workshop manual with troubleshooting.pdf
Download New Holland E75CSR workshop manual with troubleshooting.pdfDownload New Holland E75CSR workshop manual with troubleshooting.pdf
Download New Holland E75CSR workshop manual with troubleshooting.pdf
Service Repair Manual
 
美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办
美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办
美国纽约州立大学阿尔弗雷德分校毕业证书学位证书不见了怎么办
Taqyea
 
Ad

Information Security 05- Encryption.pdfn

  • 1. Encryption • Encryption is a fundamental technique used in information security to protect the confidentiality and integrity of data. • It involves the process of converting plain text or data into an encoded form called ciphertext, which can only be accessed and understood by authorized parties with the corresponding decryption key.
  • 2. Encryption cont… Key Terms • Cryptography comes from the Greek words kryptos, meaning “hidden,” and graphein, meaning “to write,” and involves making and using codes to secure messages. • Cryptanalysis involves cracking or breaking encrypted messages back into their unencrypted origins. • Cryptography uses mathematical algorithms that are usually known to all.
  • 3. Encryption cont… Key Terms • After all, cryptography is not the knowledge of the algorithm that protects the encrypted message, it’s the knowledge of the key, a series of characters or bits injected into the algorithm along with the original message to create the encrypted message.
  • 4. Encryption cont… Key Terms • Cipher: When used as a verb, the transformation of the individual components (characters, bytes, or bits) of an unencrypted message into encrypted components or vice versa; • Cipher: When used as a noun, the process of encryption or the algorithm used in encryption, and a term synonymous with cryptosystem.
  • 5. Encryption cont… Key Terms • Encryption(Encipher):The process of converting an origin al message (plaintext) into a form that cannot be used by unauthorized individuals (ciphertext). Also referred to as enciphering. • Encryption renders the data contents to unreadable and inaccessible form, unless one have the decryption key.
  • 6. Encryption cont… Key Terms • Decryption (Decipher): The process of converting an encoded or enciphered message (ciphertext) back to its original readable form (plaintext). Also referred to as deciphering. • Decryption requires two elements: the correct password and the corresponding decryption algorithm.
  • 7. Encryption cont… Key Terms • Plaintext or cleartext: is an unencrypted, readable, plain message that anyone can read. • Ciphertext: is the result of the encryption process. • The encrypted plaintext appears as apparently random strings of characters.
  • 8. Encryption cont… Key Terms • Algorithm: The mathematical formula or method used to convert an unencrypted message into an encrypted message. • This sometimes refers to the programs that enable the cryptographic processes. • Code: The process of converting components (words/ phrases) of an unencrypted message into encrypted components.
  • 9. Encryption cont… Key Terms • Bit stream cipher: An encryption method that involves converting plaintext to ciphertext one bit at a time. • Block cipher: An encryption method that involves dividing the plaintext into blocks or sets of bits and then converting the plaintext to ciphertext one block at a time.
  • 10. Encryption cont… Key Terms • Key or cryptovariable: The information used in conjunction with the algorithm to create the ciphertext from the plaintext; it can be a series of bits used in a mathematical algorithm or the knowledge of how to manipulate the plaintext. • Key tells the algorithm how to transform the plaintext into ciphertext.
  • 11. Encryption cont… Key Terms • Kerckhoffs's principle states that “only secrecy of the key provides security”. • Another law states that: “encrypted data is only as secure as its decryption key”. • These statements influence the role of encryption, and keys.
  • 12. Encryption cont… Key Terms • Keeping the details of an entire encryption algorithm secret is extremely difficult; keeping a much smaller key secret is easier. • The key locks and unlocks the algorithm, allowing the encryption or decryption process to function. • Keyspace: The entire range of values that can be used to construct an individual key.
  • 13. Encryption cont… Key Terms • Link encryption: A series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts the message using different keys and sends it to the next neighbor. • This process continues until the message reaches the final destination.
  • 14. Encryption cont… Key Terms • Steganography: The process of hiding messages; for example, hiding a message within the digital encoding of a picture or graphic so that it is almost impossible to detect that the hidden message even exists. • Work factor: The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message.
  • 15. Encryption cont… Key Terms • Hash: When a website encrypts your password, it uses an encryption algorithm to convert your plaintext password to a hash. • A hash is different from encryption in that once the data is hashed, it cannot be unhashed. Or rather, it is extremely difficult. • Hashing is really useful when you need to verify
  • 16. Encryption cont… Key Terms • Symmetric and Asymmetric Algorithms: two primary encryption algorithm types: symmetric and asymmetric. • They both encrypt data, but function in a slightly different manner.
  • 17. Encryption cont… Key Terms • Symmetric algorithm: Also known as secret-key encryption, private Key encryption or shared-key encryption. • Uses the same key for both encryption and decryption. • Both parties must agreeon the algorithm key before commencing communication.
  • 18. Encryption cont… Key Terms • Symmetric Encryption Algorithms types: 8. RC6 1. Advanced Encryption Standard (AES) 9. Serpent 2. Data Encryption Standard (DES) 10. Camellia 3. Triple Data Encryption Standard (3DES) 11. CAST- 128 4. Blowfish 12. CAST- 256 5. Twofish 13. IDEA 6. RC4 14. SEED 7. RC5 15. Skipjack
  • 19. Encryption cont… Key Terms • Advanced Encryption Standard (AES): A widely use d symmetri c encryption algorithm known for its security and efficiency. • It supports key sizes of 128, 192, or 256 bits.
  • 20. Encryption cont… Key Terms • Data Encryption Standard (DES): An older symmetric encryption algorithm that uses a 56-bit key. • While DES is considered less secure by today's standards, it still finds some limited use.
  • 21. Encryption cont… Key Terms • Triple Data Encryption Standard (3DES): It applies the DES algorithm three times to each data block, providinga higher level of security than DES. • 3DES supports key sizes of 112 or 168 bits.
  • 23. Encryption cont… Key Terms Average Time Required for Exhaustive Key Search
  • 24. Encryption cont… Key Terms • Asymmetric algorithm: Also known as public-key encryption. • Uses two different keys: a public key and a private key. • This enables secure encryptionwhile communicating previously establishing a mutual algorithm. without • This is also known as public key cryptology.
  • 25. Encryption cont… Key Terms • Asymmetric Encryption Algorithms: 1. Rivest-Shamir-Adleman (RSA) 2. Elliptic Curve Cryptography (ECC) 3. Diffie-Hellman (DH) 4. Digital Signature Algorithm (DSA) 5. ElGamal 6. Paillier 7. McEliece 8. NTRU 9. Lattice-based encryption algorithms a. Learning With Errors (LWE) b. Ring Learning With Errors (RLWE) c. NTRU Prime a. b. a. b. c. d. e. f. 10. Merkle-Damgård-based Signature Scheme (MSS) 11. RSA-KEM 12. Identity-Based Encryption (IBE) 13. Attribute-Based Encryption (ABE) 14. Homomorphic Encryption Partially Homomorphic Encryption Fully Homomorphic Encryption 15. Post-Quantum Cryptography (PQC) algorithms (designed to resist attacks by quantum computers) Code-based Cryptography Lattice- based Cryptography Multivariate Cryptography Supersingular Isogeny Diffie-Hellman (SIDH) Hash-based Cryptography
  • 26. Encryption cont… Key Terms • Rivest-Shamir-Adleman (RSA): One of the asymmetric encryption algorithms. mos t widel y use d • It usesthe conceptof public and private key pairs,with encryption performed using the public key and decryption using the corresponding private key.
  • 27. Encryption cont… Key Terms • Elliptic Curve Cryptography (ECC): An asymmetric encryptio n algorithm that is gainingpopularity due to its strong security with shorter key lengths compared to RSA. • ECC uses the mathematical properties of elliptic curves for encryption and decryption.
  • 28. Encryption cont… Key Terms • Diffie-Hellman (DH): Although notstrictly an encryption algorithm, Diffie-Hellman is a key exchangeprotocol used in asymmetric encryption systems. • It allows two parties to securely establish a shared secret key over an insecure channel.
  • 29. Encryption cont… Key Terms • Public and Private Keys: Now we understand more about the function of keys in the encryption process, we can look at public and private keys. • An asymmetric algorithm uses two keys: a public key and a private key. • The public key can be sent to other people, while the private key is only known by the owner. What's the purpose of this?
  • 30. Encryption cont… Key Terms • Well, anyone with the intended recipient's public key can encrypt a private message for them, while the recipient can only read the contents of that message provided they have access to the paired private key.
  • 32. Encryption cont… Key Terms • Public and private keys also play an essential role in digital signatures, whereby a sender can sign their message with their private encryption key. • Those with the public key can then verify the message, safe in the knowledge that the original message came from the sender's private key.
  • 33. Encryption cont… Key Terms • Public and private keys also play an essential role in digital signatures, whereby a sender can sign their message with their private encryption key. • Those with the public key can then verify the message, safe in the knowledge that the original message came from the sender's private key. • A key pair is the mathematically linked public and private key generated by an encryption algorithm.
  • 34. Encryption cont… Key Terms • HTTPS: Hyper Text Transfer Protocol Secure (HTTPS) is a now widely implemented security upgrade for the HTTP application protocol that is a foundation of the internet as we know it. • When using a HTTPS connection, your data is encrypted using Transport Layer Security (TLS), protecting your data while in transit.
  • 35. Encryption cont… Key Terms • HTTPS generates long-term private and public keys that in turn are used to create a short-term session key. • The session key is a single-use symmetric key that the connection destroys once you leave the HTTPS site (closing the connection and ending its encryption).
  • 36. Encryption cont… Key Terms • However,when you revisitthe site,you will receiveanother single- use session key to secure your communication. • A site must completely follow to HTTPS to offer users complete security. • Since 2018 the majority of sites online began offering HTTPS connections over standard HTTP.
  • 37. Encryption cont… Key Terms • End-to-End Encryption: One of the biggestencryption buzzwordsis that of end-to-end encryption. • Social messaging platform service WhatsApp began offering its users end-to-end encryption (E2EE) in 2016, making sure their messages are private at all times.
  • 38. Encryption cont… Key Terms • In the context of a messaging service, EE2E means that once you hit the send button, the encryption remains in place until the recipient receives the messages. • Well, this means that the private key used for encoding and decoding your messages never leaves your device, in turn ensuring that no one but you can send messages using