SENSITIVE DATA PRIVATE INFORMATION
DATA IN TRANSIT SECURITY OF
OVER NETWORKS COMMUNICATION
DATA STORED ON DATA STORED ON
STORAGE DEVICES COMPUTERS
Encryption, as name suggests, is generally a technique that
is used to conceal message using algorithms.
The time and difficulty of guessing information is what
makes encryption such a valuable security tool.
INTEGRITY
CONFIDENTIALITY AUTHENTICATION
proves the contents of
a message have not
encodes the been changed since it verifies the origin of
message's content. was sent. a message.
The science of
encrypting and
decrypting information
is called
The prefix means and
suffix means
AND HOW DOES IT WORK?
SYMMETRIC
CRYPTOGRAPHY
ASYMMETRIC
CRYPTOGRAPHY
ABSTRACT DESIGN
We believe people need Minimalist and easy to use
more products specifically
dedicated to this niche
market
The private key is faster than the public
It is slower than a private key.
key.
In this, the same key (secret key) and In public-key cryptography, two keys are
algorithm are used to encrypt and used, one key is used for encryption,
decrypt the message. and the other is used for decryption.
In private key cryptography, the key is In public-key cryptography, one of the
kept a secret. two keys is kept a secret.
The private key is Symmetrical The public key is Asymmetrical
ENCRYPTION vs CRYPTOGRAPHY
• principal application • art of creating codes
of cryptography. using techniques of
encryption and
• process of encoding decryption.
message or
information so that • study of techniques such
only authorized as encryption for secure
parties can have communication in
access to it. presence of third parties.
• Types of encryption • Types of cryptography
includes symmetric includes symmetric key
and asymmetric cryptography and
encryption. asymmetric key
cryptography.