Upload
reshmy12
View
104
Download
0
Embed Size (px)
Citation preview
Disclaimer: This presentation is prepared by trainees of baabtra as a part of mentoring program. This is not official document of baabtra –Mentoring PartnerBaabtra-Mentoring Partner is the mentoring division of baabte System Technologies Pvt . Ltd
CONTENTS
• What is encryption?• why is it important?• Why use encryption?• Examples of Encryption• How it works??
Encryption
• Encryption is the most effective way to achieve data security
• Encryption is the process of converting data to an unrecognizable or "encrypted" form.
• Encryption is also used to secure data sent over wireless networks and the Internet
why is it important?
• Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to.
Why use encryption?• Authentication
• Protects personal data such as passwords.
Privacy• Provides for confidentiality of private
information.
• Integrity• Ensures that a document or file has not
been altered.
Examples of Encryption• Web browser encryption
• Email encryption
• Hard drive encryption
How it works??
• Start with a message that has to be sent securely. This could be
Text.Numeric Data.Secret Codes
Next we need an encryption key. This could be a phrase like My secret password phrase�
The computer receiving the message knows the digital key and so is able to work out the original message.
Encryption methods
• Hashing EncryptionSince a hash is unique to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering. Some common hashing algorithms are Message Digest 5 (MD5) and Secure Hashing Algorithm (SHA).
• Symmetric Methods– also called private-key cryptography, is one of the
oldest and most secure encryption methods– A sender encodes a message into ciphertext using
a Private key, and the receiver uses the same key to decode it
• Asymmetric Forms Asymmetric, or public key, cryptography is,
potentially, more secure than symmetric methods of encryption.
Uses two keys, a "private" key and a "public key," to perform encryption and decryption
Thankyou…
Want to learn more about programming or Looking to become a good programmer?
Are you wasting time on searching so many contents online?
Do you want to learn things quickly?
Tired of spending huge amount of money to become a Software professional?
Do an online course @ baabtra.com
We put industry standards to practice. Our structured, activity based courses are so designed to make a quick, good software professional out of anybody who holds a passion for coding.
Follow us @ twitter.com/baabtra
Like us @ facebook.com/baabtra
Subscribe to us @ youtube.com/baabtra
Become a follower @ slideshare.net/BaabtraMentoringPartner
Connect to us @ in.linkedin.com/in/baabtra
Give a feedback @ massbaab.com/baabtra
Thanks in advance
www.baabtra.com | www.massbaab.com |www.baabte.com
Emarald Mall (Big Bazar Building)Mavoor Road, Kozhikode,Kerala, India.Ph: + 91 – 495 40 25 550
NC Complex, Near Bus StandMukkam, Kozhikode,Kerala, India.Ph: + 91 – 495 40 25 550
Cafit Square,Hilite Business Park,Near Pantheerankavu,Kozhikode
Start up VillageEranakulam,Kerala, India.Email: [email protected]
Contact Us