1 / 24

Encryption Explained Simply | What Is Encryption? | Simplilearn

In today's presentation on encryption explained simply, we take a look at why cryptography is essential when it comes to protecting our privacy on the internet. We take a look at how what is encryption, how encryption and decryption work with simple step-by-step explanations and move on to its core concepts such as ciphertexts, symmetric and asymmetric encryption methodologies, among other things. Finally, we learn about the applications of encryption and cryptography in general in our daily life and usage, starting from secure web browsing to making payments over the internet.<br>

Simplilearn
Download Presentation

Encryption Explained Simply | What Is Encryption? | Simplilearn

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Messaging on the air is always prone to getting hacked.

  2. Messaging on the air is always prone to getting hacked. Chat messages

  3. Click here to watch the video

  4. Messaging on the air is always prone to getting hacked. Chat messages Hackers

  5. On encrypting the messages, data is secure in transmission Encryption Ciphertext Texts Hackers

  6. Encryption converts the plaintext messages into scrambled information, which is unreadable to general users. “Call me” “Call me” Encryption Decryption S@9F#2L Original Message Original Message Coded Language

  7. “Call me today” Plaintext Encryption Algorithms G2&S#1J(S^K2 Ciphertext

  8. G2&S#1J(S^K2 Ciphertext

  9. G2&S#1J(S^K2 Ciphertext Decryption Keys “Call me today” Plaintext

  10. Keys can be used in two different ways, symmetric and asymmetric.

  11. In Symmetric Encryption, the same key is used for encryption and decryption of data. Encryption Key Plaintext Ciphertext Decryption Key

  12. The single key must belong to the sender of the message.

  13. The single key must belong to the sender of the message. “Meet today” “Oggv vqfca” Encrypted Using Sender’s Key Decrypted Using Sender’s Key “Oggv vqfca” “Meet today”

  14. In asymmetric encryption, the keys are different for encrypting and decrypting the data. Encryption Key Plaintext Ciphertext Decryption Key

  15. Both the keys must belong to the receiver of the message. Public Key Private Key

  16. Both the keys must belong to the receiver of the message. “Meet today” “dh12#djdi2+rg” Using private key to decrypt Using public key to encrypt “Meet today” “dh12#djdi2+rg”

  17. There are a number of applications that encryption has provided us. Web Browsing

  18. There are a number of applications that encryption has provided us. Secure Chat Messaging

  19. There are a number of applications that encryption has provided us. Encrypted E-Mailing

  20. There are a number of applications that encryption has provided us. Online Banking

More Related