230 likes | 261 Views
In today's presentation on encryption explained simply, we take a look at why cryptography is essential when it comes to protecting our privacy on the internet. We take a look at how what is encryption, how encryption and decryption work with simple step-by-step explanations and move on to its core concepts such as ciphertexts, symmetric and asymmetric encryption methodologies, among other things. Finally, we learn about the applications of encryption and cryptography in general in our daily life and usage, starting from secure web browsing to making payments over the internet.<br>
E N D
Messaging on the air is always prone to getting hacked. Chat messages
Messaging on the air is always prone to getting hacked. Chat messages Hackers
On encrypting the messages, data is secure in transmission Encryption Ciphertext Texts Hackers
Encryption converts the plaintext messages into scrambled information, which is unreadable to general users. “Call me” “Call me” Encryption Decryption S@9F#2L Original Message Original Message Coded Language
“Call me today” Plaintext Encryption Algorithms G2&S#1J(S^K2 Ciphertext
G2&S#1J(S^K2 Ciphertext
G2&S#1J(S^K2 Ciphertext Decryption Keys “Call me today” Plaintext
Keys can be used in two different ways, symmetric and asymmetric.
In Symmetric Encryption, the same key is used for encryption and decryption of data. Encryption Key Plaintext Ciphertext Decryption Key
The single key must belong to the sender of the message. “Meet today” “Oggv vqfca” Encrypted Using Sender’s Key Decrypted Using Sender’s Key “Oggv vqfca” “Meet today”
In asymmetric encryption, the keys are different for encrypting and decrypting the data. Encryption Key Plaintext Ciphertext Decryption Key
Both the keys must belong to the receiver of the message. Public Key Private Key
Both the keys must belong to the receiver of the message. “Meet today” “dh12#djdi2+rg” Using private key to decrypt Using public key to encrypt “Meet today” “dh12#djdi2+rg”
There are a number of applications that encryption has provided us. Web Browsing
There are a number of applications that encryption has provided us. Secure Chat Messaging
There are a number of applications that encryption has provided us. Encrypted E-Mailing
There are a number of applications that encryption has provided us. Online Banking