ENCRYPTION
Alex PierceyErica Reid
What is Encryption?
Information secured to hide from the public Used in many different ways but is mostly
used on computers Is used in hopping, banking, A secure server begins with https, rather
then http
History of Encryption
Intaglio was the first use of encryption Was a collage of images and text only the trader knows how to read the text the public couldn’t read the text The collage of images and text was also used to
identify themselves to the public• this is what we call today as “digital signature”
“666” was implied as a encrypted message ancient recipes where even encrypted to protect
from "stealing" them for commercial value
History of Encryption - In War
WW2 Germans and US both sent messages encrypted
Mathematician Marian Rejewski at the Polands Cipher Bureau decrypted the encryption code.
This was considered the greatest cryptanalysis breakthrough within a thousand years.
Asymmetric Algorithms
Complex but more secure than symmetric Uses two different keys to encrypt and
decrypt Private key is known by anyone who wants to
send an encrypted message to the owner of the Public Key
Public key is used to decrypt these messages
Symmetric Algorithms
Faster but less secure than asymmetric Each pair of users share a key Data is encrypted with a key, transferred to
another user and then decrypted by that user using the same key
The data could easily be decoded if the transfer is intercepted
How it works
Asymmetric• Asymmetric scrambles the data--making in
unretrevable.
• There are two keys, public and private
• Private is only held onto the receiver
• public is handed out to all who want to send a message
• only the private key can decrypt the message.
How it works - Pt. 2
Symmetric• The symmetric system uses only 1 key to
encrypt and decrypt the message.
• If someone where to get the key, the system fail and renders useless
• The advantage of using symmetric is that it takes up less time and space
How it Works Pt. 3
Data is passed through an algorithm (mathematical code) and is transformed into ciphertext (encrypted data)
This process takes place with the use of a key that you yourself provide
There are two types of algorithms used: Asymmetric and symmetric
How it works Pt. 4 - Asymmetric Algorithms
Complex but more secure than symmetric Uses two different keys to encrypt and
decrypt Private key is known by anyone who wants to
send an encrypted message to the owner of the Public Key
Public key is used to decrypt these messages
E-commerce security
All data sent over the servers are encrypted all personal information is held in a one-way
computer in a different network, guarded by firewalls.
All information is held encrypted in the server.
Only time the information is decrypted is when the user related to the information uses it.