11
ENCRYPTION Alex Piercey Erica Reid

ENCRYPTION Alex Piercey Erica Reid. What is Encryption? Information secured to hide from the public Used in many different ways but is mostly used

Embed Size (px)

Citation preview

Page 1: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

ENCRYPTION

Alex PierceyErica Reid

Page 2: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

What is Encryption?

Information secured to hide from the public Used in many different ways but is mostly

used on computers Is used in hopping, banking, A secure server begins with https, rather

then http

Page 3: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

History of Encryption

Intaglio was the first use of encryption Was a collage of images and text only the trader knows how to read the text the public couldn’t read the text The collage of images and text was also used to

identify themselves to the public• this is what we call today as “digital signature”

“666” was implied as a encrypted message ancient recipes where even encrypted to protect

from "stealing" them for commercial value

Page 4: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

History of Encryption - In War

WW2 Germans and US both sent messages encrypted

Mathematician Marian Rejewski at the Polands Cipher Bureau decrypted the encryption code.

This was considered the greatest cryptanalysis breakthrough within a thousand years.

Page 5: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

Asymmetric Algorithms

Complex but more secure than symmetric Uses two different keys to encrypt and

decrypt Private key is known by anyone who wants to

send an encrypted message to the owner of the Public Key

Public key is used to decrypt these messages

Page 6: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

Symmetric Algorithms

Faster but less secure than asymmetric Each pair of users share a key Data is encrypted with a key, transferred to

another user and then decrypted by that user using the same key

The data could easily be decoded if the transfer is intercepted

Page 7: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

How it works

Asymmetric• Asymmetric scrambles the data--making in

unretrevable.

• There are two keys, public and private

• Private is only held onto the receiver

• public is handed out to all who want to send a message

• only the private key can decrypt the message.

Page 8: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

How it works - Pt. 2

Symmetric• The symmetric system uses only 1 key to

encrypt and decrypt the message.

• If someone where to get the key, the system fail and renders useless

• The advantage of using symmetric is that it takes up less time and space

Page 9: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

How it Works Pt. 3

Data is passed through an algorithm (mathematical code) and is transformed into ciphertext (encrypted data)

This process takes place with the use of a key that you yourself provide

There are two types of algorithms used: Asymmetric and symmetric

Page 10: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

How it works Pt. 4 - Asymmetric Algorithms

Complex but more secure than symmetric Uses two different keys to encrypt and

decrypt Private key is known by anyone who wants to

send an encrypted message to the owner of the Public Key

Public key is used to decrypt these messages

Page 11: ENCRYPTION Alex Piercey Erica Reid. What is Encryption?  Information secured to hide from the public  Used in many different ways but is mostly used

E-commerce security

All data sent over the servers are encrypted all personal information is held in a one-way

computer in a different network, guarded by firewalls.

All information is held encrypted in the server.

Only time the information is decrypted is when the user related to the information uses it.