1 / 11

Computer encryption is…

Computer encryption is…. Based on the science of cryptography. Encryption Padlock Analogy. Anybody can lock a padlock…. but, it takes a key to unlock it!. Symmetric key encryption. In encryption , the word symmetric means those cases where the same key both encrypts and decrypts.

sylvie
Download Presentation

Computer encryption is…

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer encryption is… Based on the science of cryptography

  2. Encryption Padlock Analogy Anybody can lock a padlock… but, it takes a key to unlock it!

  3. Symmetric key encryption In encryption, the word symmetric means those cases where the same key both encrypts and decrypts.

  4. Asymmetric key encryption Type of encryption in which an encryption key (the public key) is used to encrypt a message, and another encryption key (the private key) is used to decrypt the message.

  5. Public Key Security SSLTLS (Secure Sockets Layer) (Transport Layer Security)

  6. Other Security Tools • Checksum • CRC (Cyclic Redundancy Check) If a single character in the data is changed, then the data has been corrupted. Checksum or CRC e4d909c290d0fb1ca068ffaddf22cbd0 Not identical Checksum or CRC 35d91262b3c3ec8841b54169588c97f7

  7. Ciphers or codes = algorithms. Most cryptography used today relies on computers because of the speed and security computers provide in cracking codes.

  8. Hashing Algorithm + = Different Color Alice Alice One-way function* + = Different Color Bob Bob + + = Same Color Alice Alice Bob + = Same Color + Bob Bob Alice *Example of two- way mathematical function = light switch.

  9. Encryption + Authentication • Passwords • Pass cards • Digital Signatures • Fingerprint scan • Retina scan • Face Scan • Voice identification

  10. Why do we need encryption? • Credit-card information • Social Security numbers • Private correspondence • Personal details • Sensitive school information • Bank-account information

  11. But wait…there’s more! • http://btwikilmc.pbworks.com/Encryption • http://www.aptv.org/aptplus/

More Related