ENCRYPTION &
DECRYPTION
Prepared By: Jeremiah
Olubunmi
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Question of The Day!
“If you send your ATM PIN to a
friend over WhatsApp, how do
you think it stays private from
hackers, the government, or
even WhatsApp itself?”
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Introduction to Cryptography
The word "cryptography" itself comes
from the Greek words "kryptos" which
means hidden and “graphein” which
means writing.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Drefinitions of Cryptography
Cryptography is the practice and study of techniques for secure
communication in the presence of adversaries. It's essentially about
hiding or coding information so that only the intended recipient can
understand it.
Cryptography is one of the oldest and most fundamental means of
protecting information. It is the practice of using mathematical formulas
to protect information by transforming the information into another
format to ensure the information cannot be read or accessed by
unauthorized parties.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Drefinitions of Cryptography
For example: Whatsapp end-to-end
encryption, browsers with HTTPS, online
banking logins. The core concept of
cryptography is hinged on Confidentiality,
Integrity and Authentication and Non-
repudiation.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Drefinitions of Cryptography
To protect data, it is important to consider
how it is protected at rest (stored on
computers, servers, physical media, etc.)
and in transit (data moving between
computers on a network) as part of the
data lifecycle and in line with the
organization’s data classification.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Drefinitions of Cryptography
Data at rest can be protected by implementing disk
encryption on a computer or server drive, database
encryption, or encryption at the data level such as
file, folder, or field-level encryption. Data in transit
(also known as data in motion) is protected by
utilizing encrypted network connection protocols
such as Secure Sockets Layer/Transport Layer
Security (SSL/TLS) and virtual private network
(VPN) encryption.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Encryption & Decryption
Encryption is the process of transforming
plaintext (information that is in a readable
format) into ciphertext (information that is in
an encrypted, unreadable format).
Decryption is the process of transforming
ciphertext back to plaintext.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
The encryption and decryption processes are
implemented by utilizing cryptographic algorithms and
cryptographic keys. A cryptographic algorithm is a
mathematical equation that is used to perform a
cryptographic function (such as encryption/decryption). A
cryptographic key is a value that is used as input into a
cryptographic algorithm that enables it to perform its
cryptographic function. Together, keys and algorithms
allow for encryption and decryption operations to take
place to transform plaintext to ciphertext and vice versa.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Types of Encryption:
1. Symmetric-Key Cryptography (Secret-Key): Symmetric
encryption uses the same key for encryption and
decryption. The sender and receiver of a message need
to both have a copy of the same key in order to
encrypt/decrypt the message. the security of this key is
critical, and it must be kept private, since anyone with
access to this key can decrypt the messages. This is why
it is referred to as a private key. Presently, the Advanced
Encryption Standard (AES) algorithm is the most
commonly used symmetric encryption algorithm due to its
maturity, security, and international recognition.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
Types of Encryption:
2. Asymmetric-Key Cryptography (Public-Key): asymmetric
encryption uses two keys that are mathematically related: a public
key and a private key. Asymmetric encryption is sometimes called
public key cryptography due to there being a public key that can
be freely shared with anyone the sender wants to communicate
with securely. The private key must remain private and only be
known to the owner. Common asymmetric algorithms include
Diffie-Hellman, Rivest-ShamirAdleman (RSA), and Elliptic Curve
Cryptography (ECC). In the most understandable way, if we have
a public mailbox, anyone can drop letters, but only the owner with
the private key can open it.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared
CLASS PRACTICE
Students are to practice Ceasar Cipher
mode of Encryption and Decryption in
order to properly understand what has
been taught.
Disclaimer: This training material belongs to TechCrush and shouldn’t be shared