20
Encryption

Encryption

Embed Size (px)

Citation preview

Page 1: Encryption

Encryption

Page 2: Encryption

What is Encryption?

Page 3: Encryption

Main Types of Encryption

Symmetric Encryption Asymmetric Encryption Hashing

Page 4: Encryption

Symmetric Encryption ?

Text

Cipher Algorithm

SharedKey

Encrypted

Text

Cipher Algorithm

Shared Key

Decrypted

TextText

Page 5: Encryption

Symmetric Encryption

Page 6: Encryption

Symmetric Encryption-Uses

Cloud backup Services To encrypt computer or storage device To create secure Channel between two endpoints

Page 7: Encryption

Symmetric Encryption-Drawbacks

Encryption becomes useless Attacker gains the key over network Software or Platform itself is compromised

Page 8: Encryption

Text

Cipher Algorithm

Public / Private Key

Encrypted

Text

Cipher Algorithm

Private / Public

Key

Decrypted

TextText

Asymmetric Encryption ?

Page 9: Encryption

Asymmetric Encryption

Page 10: Encryption

Asymmetric Encryption-Uses

TLS (Transport layer Security) SSH (Secure Sockets Layer) In Email

Page 11: Encryption

Asymmetric Encryption-Drawbacks

Main problem trusted public key Man in Middle

Page 12: Encryption

Hashing ?

Data Storage String or Number Fixed length Result vary widely with small variations in input

Page 13: Encryption

Hash Encryption ?

Page 14: Encryption

Hash Encryption

Properties the same data will always produce the same hash it’s impossible to reverse it back to the original data

it’s infeasible to create another string of data that will create the same hash

Page 15: Encryption

Hash Encryption-Uses

Passwords Files

Page 16: Encryption

Hash Encryption-Weakness

Impossible to reverse a hash

Costs a lot to find a collision for

Page 17: Encryption

Difference b/w Encryption vs Hashing

Hashing

Page 18: Encryption

Difference b/w Encryption vs Hashing

Encryption

Page 19: Encryption
Page 20: Encryption