Search Header Logo
Data Encryption &  Cryptography

Data Encryption & Cryptography

Assessment

Presentation

Computers

University

Hard

Created by

Christian Banlaygas

Used 1+ times

FREE Resource

27 Slides • 0 Questions

1

media

Data Encryption &
Cryptography

𝐈𝐍𝐅𝐎𝐑𝐌𝐀𝐓𝐈𝐎𝐍𝐀𝐒𝐒𝐔𝐑𝐀𝐍𝐂𝐄𝐀𝐍𝐃𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘

Christian Banlaygas
BSIT - III

2

media

What is Cryptography?

In computer science, cryptography refers to
secure information and communication techniques
derived from mathematical concepts and a set of
rule-based calculations called algorithms, to
transform messages in ways that are hard to
decipher. These deterministic algorithms are used
for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing
on the internet and confidential communications
such as credit card transactions and email.

3

media


Encryption

Encryption is a process which transforms the
original information into an unrecognizable form.
This new form of the message is entirely
different from the original message. That’s why
a hacker is not able to read the data as senders
use an encryption algorithm. Encryption is
usually done using key algorithms.


Decryption

Decryption is a process of converting
encoded/encrypted data in a form that is
readable and understood by a human or a
computer. This method is performed by un-
encrypting the text manually or by using keys
used to encrypt the original data.

4

media

What is Cipher?

Ciphers are arguably the corner stone of
cryptography. In general, a cipher is simply just a
set of steps (an algorithm) for performing both
an encryption, and the corresponding
decryption.

Despite might what seem to be a relatively
simple concept, ciphers play a crucial role in
modern technology. Technologies involving
communication (including the internet, mobile
phones, digital television or even ATMs) rely on
ciphers in order to maintain both security and
privacy.

5

media

Example of Cipher

Caesar Cipher

01

Rosicrucian Cipher

02

Vigenère Cipher

03

Morse Code

04

6

media

Caesar Cipher

Sending coded messages during times of
war has been around for centuries. In Julius
Caesar’s code, you shift the letters of the
alphabet. In this example, the letters shift
three spaces to the left.

The shifts can change to the right or to the
left. Also, the number of spaces the
alphabet shifts can also be changed. This
keeps the enemy from easily deciphering
the message.

7

media

Rosicrucian Cipher

The Rosicrucian (also known as the Pigpen
Cipher) was first published in 1531 by both
the Rosicrucian brotherhood and the
Freemasons.

The cipher uses a geometric simple
substitution. First, draw two grids (tic tac
toe style) and two Xs. Write each letter of
the alphabet in the blank spaces as shown.
Add dots to the second grid and X to
distinguish the two.

8

media

Vigenère Cipher

The Vigenère Cipher was invented by Giovan
Battista Bellaso in 1553. It uses a table
consisting of 26 alphabetized letters across
and 27 letters down. To use this code, you
must first know the secret phrase. During the
American Civil War, the secret phrases
included:

·Manchester Bluff
·Complete Victory
·Come Retribution

9

media
media

Morse Code

Samuel Morse and Alfred Vail developed the
code for the telegraph machine. A telegraph
operator would sit at the machine and tap out
long and short taps to represent the letters in
the message he was sending.


Morse Code was invented by Samuel Morse
and Alfred Vail. It uses a series of long and
short pulses. A dot equals one short pulse (x)
called a dit. The dashes called dahs are equal
in length to three dots (3x). The space
between each letter is equal to a dash (3x).
The space between words is equal to seven
dots (7x).

10

media

Modern Cryptography &
Data Encryption

Modern encryption is the key to advanced computer and
communication security. This stream of cryptography is
completely based on the ideas of mathematics such as number
theory and computational complexity theory, as well as
concepts of probability.

The 2 types of Modern Cryptography are Symmetric Key
Encryption and Asymmetric Key Encryption.

11

media


Symmetric Key
Encryption

Symmetric key encryption technique uses a straight
forward method of encryption. Hence, this is the
simpler among these two practices. In the case of
symmetric key encryption, the encryption is done
through only one secret key, which is known as
"Symmetric Key", and this key remains to both the
parties. The same key is implemented for both
encodings as well as decoding the information.


Asymmetric Key
Encryption

Asymmetric Encryption is another encryption method
that uses two keys: a new and sophisticated encryption
technique. This is because it integrates two
cryptographic keys for implementing data security.
These keys are termed as Public Key and Private Key.
The "public key", as the name implies, is accessible to
all who want to send an encrypted message. The other
is the "private key" that is kept secure by the owner of
that public key or the one who is encrypting.

12

media

Uses of
Encryption

Data Protection for Storage

It can be used to protect the data stored for a long time. Even if the
storage is stolen or breached, the data will still be unreadable without
the key.

01

Data Migration

When transferring data via a network, It is used to ensure that no one in
the network can read it.

02

Ensuring Compliance

Considering the value of data security, many organizations,
governments, and companies require the data to be secured with
Encryption to keep the company or user data safe. This also prevents
employees from having unauthorized access to user data.

04

Accessing Data Across Multiple Devices

Data stored on cloud storage is Encrypted, and it can then be accessed
from any supported device securely.

03

13

media

Aspects of Data Encryption

Authenticity

Integrity

Confidentiality

Non-Repudiation

14

media

Confidentiality

This is the assurance that information is
not disclosed to unauthorized individuals,
groups, processes, or devices. Highly
confidential data must be encrypted so
third parties cannot easily decrypt it. Only
those who are authorized to view the
information are allowed access.

15

media

Integrity

The accuracy and completeness of vital
information must be safeguarded. Data
should not be altered or destroyed during
transmission and storage. This involves
making sure that an information system is
not tampered by any unauthorized
entities. Policies should be in place so
that users know how to properly utilize
their system.

16

media

Authenticity

This security measure is designed to
establish the validity of a transmission,
message, or originator, or a means of
verifying an individual’s authorization to
receive specific information.
Authentication prevents impersonation
and requires users to confirm their
identities before being allowed access to
systems and resources. This includes
user names, passwords, emails,
biometrics, and others.

17

media

Non-

Repudiation

This attribute assures the sender of data
is provided with proof of delivery and the
recipient is provided with proof of the
sender’s identity, so neither party can
deny sending, receiving, or accessing the
data. Security principles should be used
to prove identities and to validate the
communication process.

18

media

Data Backup, Management, Verification,

& Validation

Backups are like insurance during recovery. A valid backup reduces downtime and
saves costs during a disaster period. It is essential to have a healthy backup of the
configuration files for a quick recovery. Without a healthy backup, an organization
would need to invest in people and time to reconfigure the entire environment also this
poses a situation to create new errors to restore the backups. This is one important
reason to have a valid backup of configuration files. It is important to have an error-free
data backup, which will help the organization to restore all important files and folders in
place during the recovery phase. Therefore, the key is to have a healthy backup, and
backup verification is the best way to always test and validate the backups in the
organization, it may be time-consuming and expensive, but it sure does gives an
assurance of being safe during the crisis.

19

media

Authentication Factor

An authentication factor is a special
category of security credential that is used
to verify the identity and authorization of a
user attempting to gain access, send
communications, or request data from a
secured network, system or application.

Five Authentication Factor Categories

Knowledge Factors

Possession Factors

Inherence Factors

Location Factors

20

media


Knowledge Factors

Knowledge factors require the user to provide
some data or information before they can
access a secured system. A password or
personal identification number (PIN) is the most
common type of knowledge-based
authentication factor used to restrict access to
a system.


Possession Factors

Possession factors require the user to possess
a specific piece of information or device before
they can be granted access to the system.
Possession factors are typically controlled
through a device that is known to belong to the
correct user.

21

media


Inherence Factors

Inherence factors authenticate access
credentials based on factors that are unique to
the user. These include fingerprints,
thumbprints, and palm or handprints. Voice and
facial recognition and retina or iris scans are
also types of inherent authentication factors.


Location Factors

Network administrators can implement services
that use geolocation security checks to verify
the location of a user before granting access to
an application, network or system.

22

media

Common Data
Encryption Techniques

BitLocker

01

File Sharing/Hosting Service

02

VPN

03

Cryptocurrency

04

Messaging Apps

05

23

media


BitLocker

BitLocker Drive Encryption is a data protection
feature that integrates with the operating
system and addresses the threats of data theft
or exposure from lost, stolen, or inappropriately
decommissioned computers.


File Sharing/Hosting
Service

File hosting service is an Internet hosting
service that is exclusively designed for hosting
user files. The word hosting indicates that only
user data is stored on the back end for Internet
and related services. The stored data may
belong to one or more users. The users can
later access or retrieve this data through FTP or
HTTP.

24

media


VPN

VPN stands for "Virtual Private Network" and
describes the opportunity to establish a
protected network connection when using
public networks. VPNs encrypt your internet
traffic and disguise your online identity. This
makes it more difficult for third parties to track
your activities online and steal data. The
encryption takes place in real time.


Cryptocurrency

A cryptocurrency is a digital or virtual currency
secured by cryptography, which makes it nearly
impossible to counterfeit or double-spend.
Many cryptocurrencies are decentralized
networks based on blockchain technology--a
distributed ledger enforced by a disparate
network of computers.

25

media


Messaging Apps

Encrypted messaging (also known as secure
messaging) provides end-to-end encryption for
user-to-user text messaging. Encrypted
messaging prevents anyone from monitoring
your text conversations. Many encrypted
messaging apps also offer end-to-end
encryption for phone calls made using the apps,
as well as for files that are sent using the apps.

26

media

Resources

https://www.techtarget.com/searchsecurity/definition/cryptography
https://www.guru99.com/difference-encryption-decryption.html
https://bookunitsteacher.com/wp/?p=5914
https://www.w3schools.in/cyber-security/modern-encryption
https://www.educba.com/what-is-encryption/
https://resourcecenter.infinit-o.com/blog/the-5-pillars-of-information-
security-and-how-to-manage-them/
https://backup.ninja/news/database-backups-101-tips-how-verify-
your-backups
https://www.sumologic.com/glossary/authentication-factor/
https://learn.microsoft.com/en-us/windows/security/information-
protection/bitlocker/bitlocker-overview
https://www.techopedia.com/definition/25310/file-hosting-service
https://www.kaspersky.com/resource-center/definitions/what-is-a-
vpn
https://www.investopedia.com/terms/c/cryptocurrency.asp
https://pixelprivacy.com/resources/encrypted-messaging/

27

media

Thank You!

media

Data Encryption &
Cryptography

𝐈𝐍𝐅𝐎𝐑𝐌𝐀𝐓𝐈𝐎𝐍𝐀𝐒𝐒𝐔𝐑𝐀𝐍𝐂𝐄𝐀𝐍𝐃𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘

Christian Banlaygas
BSIT - III

Show answer

Auto Play

Slide 1 / 27

SLIDE