16

Encryption.ppt

Embed Size (px)

Citation preview

Page 1: Encryption.ppt
Page 2: Encryption.ppt

Disclaimer: This presentation is prepared by trainees of baabtra as a part of mentoring program. This is not official document of baabtra –Mentoring PartnerBaabtra-Mentoring Partner is the mentoring division of baabte System Technologies Pvt . Ltd

Page 3: Encryption.ppt

Reshmy [email protected]/

usernametwitter.com/usernamein.linkedin.com/in/

profilename

ENCRYPTION

Page 4: Encryption.ppt

CONTENTS

• What is encryption?• why is it important?• Why use encryption?• Examples of Encryption• How it works??

Page 5: Encryption.ppt

Encryption

• Encryption is the most effective way to achieve data security

• Encryption is the process of converting data to an unrecognizable or "encrypted" form.

• Encryption is also used to secure data sent over wireless networks and the Internet

Page 6: Encryption.ppt

why is it important?

• Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to.

Page 7: Encryption.ppt

Why use encryption?• Authentication

• Protects personal data such as passwords.

Privacy• Provides for confidentiality of private

information.

• Integrity• Ensures that a document or file has not

been altered.

Page 8: Encryption.ppt

Examples of Encryption• Web browser encryption

• Email encryption

• Hard drive encryption

Page 9: Encryption.ppt

How it works??

• Start with a message that has to be sent securely. This could be

Text.Numeric Data.Secret Codes

Next we need an encryption key. This could be a phrase like My secret password phrase�

The computer receiving the message knows the digital key and so is able to work out the original message.

Page 10: Encryption.ppt

Encryption methods

• Hashing EncryptionSince a hash is unique to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering. Some common hashing algorithms are Message Digest 5 (MD5) and Secure Hashing Algorithm (SHA).

Page 11: Encryption.ppt

• Symmetric Methods– also called private-key cryptography, is one of the

oldest and most secure encryption methods– A sender encodes a message into ciphertext using

a Private key, and the receiver uses the same key to decode it

Page 12: Encryption.ppt

• Asymmetric Forms Asymmetric, or public key, cryptography is,

potentially, more secure than symmetric methods of encryption.

Uses two keys, a "private" key and a "public key," to perform encryption and decryption

Page 13: Encryption.ppt

Thankyou…

Page 14: Encryption.ppt

Want to learn more about programming or Looking to become a good programmer?

Are you wasting time on searching so many contents online?

Do you want to learn things quickly?

Tired of spending huge amount of money to become a Software professional?

Do an online course @ baabtra.com

We put industry standards to practice. Our structured, activity based courses are so designed to make a quick, good software professional out of anybody who holds a passion for coding.

Page 15: Encryption.ppt

Follow us @ twitter.com/baabtra

Like us @ facebook.com/baabtra

Subscribe to us @ youtube.com/baabtra

Become a follower @ slideshare.net/BaabtraMentoringPartner

Connect to us @ in.linkedin.com/in/baabtra

Give a feedback @ massbaab.com/baabtra

Thanks in advance

www.baabtra.com | www.massbaab.com |www.baabte.com

Page 16: Encryption.ppt

Emarald Mall (Big Bazar Building)Mavoor Road, Kozhikode,Kerala, India.Ph: + 91 – 495 40 25 550

NC Complex, Near Bus StandMukkam, Kozhikode,Kerala, India.Ph: + 91 – 495 40 25 550

Cafit Square,Hilite Business Park,Near Pantheerankavu,Kozhikode

Start up VillageEranakulam,Kerala, India.Email: [email protected]

Contact Us