KEMBAR78
Encryption and Decryption D1 | PDF | Key (Cryptography) | Encryption
0% found this document useful (0 votes)
20 views13 pages

Encryption and Decryption D1

The document provides an introduction to cryptography, explaining its purpose as a means of secure communication through techniques like encryption and decryption. It outlines two main types of encryption: symmetric-key and asymmetric-key, detailing their mechanisms and importance in protecting data. Additionally, it emphasizes the significance of data protection both at rest and in transit, utilizing various encryption methods and protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views13 pages

Encryption and Decryption D1

The document provides an introduction to cryptography, explaining its purpose as a means of secure communication through techniques like encryption and decryption. It outlines two main types of encryption: symmetric-key and asymmetric-key, detailing their mechanisms and importance in protecting data. Additionally, it emphasizes the significance of data protection both at rest and in transit, utilizing various encryption methods and protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

ENCRYPTION &

DECRYPTION
Prepared By: Jeremiah
Olubunmi

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Question of The Day!

“If you send your ATM PIN to a


friend over WhatsApp, how do
you think it stays private from
hackers, the government, or
even WhatsApp itself?”
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Introduction to Cryptography

The word "cryptography" itself comes


from the Greek words "kryptos" which
means hidden and “graphein” which
means writing.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Drefinitions of Cryptography

Cryptography is the practice and study of techniques for secure


communication in the presence of adversaries. It's essentially about
hiding or coding information so that only the intended recipient can
understand it.

Cryptography is one of the oldest and most fundamental means of


protecting information. It is the practice of using mathematical formulas
to protect information by transforming the information into another
format to ensure the information cannot be read or accessed by
unauthorized parties.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Drefinitions of Cryptography

For example: Whatsapp end-to-end


encryption, browsers with HTTPS, online
banking logins. The core concept of
cryptography is hinged on Confidentiality,
Integrity and Authentication and Non-
repudiation.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Drefinitions of Cryptography

To protect data, it is important to consider


how it is protected at rest (stored on
computers, servers, physical media, etc.)
and in transit (data moving between
computers on a network) as part of the
data lifecycle and in line with the
organization’s data classification.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Drefinitions of Cryptography

Data at rest can be protected by implementing disk


encryption on a computer or server drive, database
encryption, or encryption at the data level such as
file, folder, or field-level encryption. Data in transit
(also known as data in motion) is protected by
utilizing encrypted network connection protocols
such as Secure Sockets Layer/Transport Layer
Security (SSL/TLS) and virtual private network
(VPN) encryption.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Encryption & Decryption

Encryption is the process of transforming


plaintext (information that is in a readable
format) into ciphertext (information that is in
an encrypted, unreadable format).

Decryption is the process of transforming


ciphertext back to plaintext.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


The encryption and decryption processes are
implemented by utilizing cryptographic algorithms and
cryptographic keys. A cryptographic algorithm is a
mathematical equation that is used to perform a
cryptographic function (such as encryption/decryption). A
cryptographic key is a value that is used as input into a
cryptographic algorithm that enables it to perform its
cryptographic function. Together, keys and algorithms
allow for encryption and decryption operations to take
place to transform plaintext to ciphertext and vice versa.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Types of Encryption:
1. Symmetric-Key Cryptography (Secret-Key): Symmetric
encryption uses the same key for encryption and
decryption. The sender and receiver of a message need
to both have a copy of the same key in order to
encrypt/decrypt the message. the security of this key is
critical, and it must be kept private, since anyone with
access to this key can decrypt the messages. This is why
it is referred to as a private key. Presently, the Advanced
Encryption Standard (AES) algorithm is the most
commonly used symmetric encryption algorithm due to its
maturity, security, and international recognition.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Types of Encryption:
2. Asymmetric-Key Cryptography (Public-Key): asymmetric
encryption uses two keys that are mathematically related: a public
key and a private key. Asymmetric encryption is sometimes called
public key cryptography due to there being a public key that can
be freely shared with anyone the sender wants to communicate
with securely. The private key must remain private and only be
known to the owner. Common asymmetric algorithms include
Diffie-Hellman, Rivest-ShamirAdleman (RSA), and Elliptic Curve
Cryptography (ECC). In the most understandable way, if we have
a public mailbox, anyone can drop letters, but only the owner with
the private key can open it.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared


CLASS PRACTICE
Students are to practice Ceasar Cipher
mode of Encryption and Decryption in
order to properly understand what has
been taught.

Disclaimer: This training material belongs to TechCrush and shouldn’t be shared

You might also like