
Data Encryption & Cryptography
Presentation
•
Computers
•
University
•
Hard
Christian Banlaygas
Used 1+ times
FREE Resource
27 Slides • 0 Questions
1
Data Encryption &
Cryptography
𝐈𝐍𝐅𝐎𝐑𝐌𝐀𝐓𝐈𝐎𝐍𝐀𝐒𝐒𝐔𝐑𝐀𝐍𝐂𝐄𝐀𝐍𝐃𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘
Christian Banlaygas
BSIT - III
2
What is Cryptography?
In computer science, cryptography refers to
secure information and communication techniques
derived from mathematical concepts and a set of
rule-based calculations called algorithms, to
transform messages in ways that are hard to
decipher. These deterministic algorithms are used
for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing
on the internet and confidential communications
such as credit card transactions and email.
3
Encryption
Encryption is a process which transforms the
original information into an unrecognizable form.
This new form of the message is entirely
different from the original message. That’s why
a hacker is not able to read the data as senders
use an encryption algorithm. Encryption is
usually done using key algorithms.
Decryption
Decryption is a process of converting
encoded/encrypted data in a form that is
readable and understood by a human or a
computer. This method is performed by un-
encrypting the text manually or by using keys
used to encrypt the original data.
4
What is Cipher?
Ciphers are arguably the corner stone of
cryptography. In general, a cipher is simply just a
set of steps (an algorithm) for performing both
an encryption, and the corresponding
decryption.
Despite might what seem to be a relatively
simple concept, ciphers play a crucial role in
modern technology. Technologies involving
communication (including the internet, mobile
phones, digital television or even ATMs) rely on
ciphers in order to maintain both security and
privacy.
5
Example of Cipher
Caesar Cipher
01
Rosicrucian Cipher
02
Vigenère Cipher
03
Morse Code
04
6
Caesar Cipher
Sending coded messages during times of
war has been around for centuries. In Julius
Caesar’s code, you shift the letters of the
alphabet. In this example, the letters shift
three spaces to the left.
The shifts can change to the right or to the
left. Also, the number of spaces the
alphabet shifts can also be changed. This
keeps the enemy from easily deciphering
the message.
7
Rosicrucian Cipher
The Rosicrucian (also known as the Pigpen
Cipher) was first published in 1531 by both
the Rosicrucian brotherhood and the
Freemasons.
The cipher uses a geometric simple
substitution. First, draw two grids (tic tac
toe style) and two Xs. Write each letter of
the alphabet in the blank spaces as shown.
Add dots to the second grid and X to
distinguish the two.
8
Vigenère Cipher
The Vigenère Cipher was invented by Giovan
Battista Bellaso in 1553. It uses a table
consisting of 26 alphabetized letters across
and 27 letters down. To use this code, you
must first know the secret phrase. During the
American Civil War, the secret phrases
included:
·Manchester Bluff
·Complete Victory
·Come Retribution
9
Morse Code
Samuel Morse and Alfred Vail developed the
code for the telegraph machine. A telegraph
operator would sit at the machine and tap out
long and short taps to represent the letters in
the message he was sending.
Morse Code was invented by Samuel Morse
and Alfred Vail. It uses a series of long and
short pulses. A dot equals one short pulse (x)
called a dit. The dashes called dahs are equal
in length to three dots (3x). The space
between each letter is equal to a dash (3x).
The space between words is equal to seven
dots (7x).
10
Modern Cryptography &
Data Encryption
Modern encryption is the key to advanced computer and
communication security. This stream of cryptography is
completely based on the ideas of mathematics such as number
theory and computational complexity theory, as well as
concepts of probability.
The 2 types of Modern Cryptography are Symmetric Key
Encryption and Asymmetric Key Encryption.
11
Symmetric Key
Encryption
Symmetric key encryption technique uses a straight
forward method of encryption. Hence, this is the
simpler among these two practices. In the case of
symmetric key encryption, the encryption is done
through only one secret key, which is known as
"Symmetric Key", and this key remains to both the
parties. The same key is implemented for both
encodings as well as decoding the information.
Asymmetric Key
Encryption
Asymmetric Encryption is another encryption method
that uses two keys: a new and sophisticated encryption
technique. This is because it integrates two
cryptographic keys for implementing data security.
These keys are termed as Public Key and Private Key.
The "public key", as the name implies, is accessible to
all who want to send an encrypted message. The other
is the "private key" that is kept secure by the owner of
that public key or the one who is encrypting.
12
Uses of
Encryption
Data Protection for Storage
It can be used to protect the data stored for a long time. Even if the
storage is stolen or breached, the data will still be unreadable without
the key.
01
Data Migration
When transferring data via a network, It is used to ensure that no one in
the network can read it.
02
Ensuring Compliance
Considering the value of data security, many organizations,
governments, and companies require the data to be secured with
Encryption to keep the company or user data safe. This also prevents
employees from having unauthorized access to user data.
04
Accessing Data Across Multiple Devices
Data stored on cloud storage is Encrypted, and it can then be accessed
from any supported device securely.
03
13
Aspects of Data Encryption
Authenticity
Integrity
Confidentiality
Non-Repudiation
14
Confidentiality
This is the assurance that information is
not disclosed to unauthorized individuals,
groups, processes, or devices. Highly
confidential data must be encrypted so
third parties cannot easily decrypt it. Only
those who are authorized to view the
information are allowed access.
15
Integrity
The accuracy and completeness of vital
information must be safeguarded. Data
should not be altered or destroyed during
transmission and storage. This involves
making sure that an information system is
not tampered by any unauthorized
entities. Policies should be in place so
that users know how to properly utilize
their system.
16
Authenticity
This security measure is designed to
establish the validity of a transmission,
message, or originator, or a means of
verifying an individual’s authorization to
receive specific information.
Authentication prevents impersonation
and requires users to confirm their
identities before being allowed access to
systems and resources. This includes
user names, passwords, emails,
biometrics, and others.
17
Non-
Repudiation
This attribute assures the sender of data
is provided with proof of delivery and the
recipient is provided with proof of the
sender’s identity, so neither party can
deny sending, receiving, or accessing the
data. Security principles should be used
to prove identities and to validate the
communication process.
18
Data Backup, Management, Verification,
& Validation
Backups are like insurance during recovery. A valid backup reduces downtime and
saves costs during a disaster period. It is essential to have a healthy backup of the
configuration files for a quick recovery. Without a healthy backup, an organization
would need to invest in people and time to reconfigure the entire environment also this
poses a situation to create new errors to restore the backups. This is one important
reason to have a valid backup of configuration files. It is important to have an error-free
data backup, which will help the organization to restore all important files and folders in
place during the recovery phase. Therefore, the key is to have a healthy backup, and
backup verification is the best way to always test and validate the backups in the
organization, it may be time-consuming and expensive, but it sure does gives an
assurance of being safe during the crisis.
19
Authentication Factor
An authentication factor is a special
category of security credential that is used
to verify the identity and authorization of a
user attempting to gain access, send
communications, or request data from a
secured network, system or application.
Five Authentication Factor Categories
Knowledge Factors
Possession Factors
Inherence Factors
Location Factors
20
Knowledge Factors
Knowledge factors require the user to provide
some data or information before they can
access a secured system. A password or
personal identification number (PIN) is the most
common type of knowledge-based
authentication factor used to restrict access to
a system.
Possession Factors
Possession factors require the user to possess
a specific piece of information or device before
they can be granted access to the system.
Possession factors are typically controlled
through a device that is known to belong to the
correct user.
21
Inherence Factors
Inherence factors authenticate access
credentials based on factors that are unique to
the user. These include fingerprints,
thumbprints, and palm or handprints. Voice and
facial recognition and retina or iris scans are
also types of inherent authentication factors.
Location Factors
Network administrators can implement services
that use geolocation security checks to verify
the location of a user before granting access to
an application, network or system.
22
Common Data
Encryption Techniques
BitLocker
01
File Sharing/Hosting Service
02
VPN
03
Cryptocurrency
04
Messaging Apps
05
23
BitLocker
BitLocker Drive Encryption is a data protection
feature that integrates with the operating
system and addresses the threats of data theft
or exposure from lost, stolen, or inappropriately
decommissioned computers.
File Sharing/Hosting
Service
File hosting service is an Internet hosting
service that is exclusively designed for hosting
user files. The word hosting indicates that only
user data is stored on the back end for Internet
and related services. The stored data may
belong to one or more users. The users can
later access or retrieve this data through FTP or
HTTP.
24
VPN
VPN stands for "Virtual Private Network" and
describes the opportunity to establish a
protected network connection when using
public networks. VPNs encrypt your internet
traffic and disguise your online identity. This
makes it more difficult for third parties to track
your activities online and steal data. The
encryption takes place in real time.
Cryptocurrency
A cryptocurrency is a digital or virtual currency
secured by cryptography, which makes it nearly
impossible to counterfeit or double-spend.
Many cryptocurrencies are decentralized
networks based on blockchain technology--a
distributed ledger enforced by a disparate
network of computers.
25
Messaging Apps
Encrypted messaging (also known as secure
messaging) provides end-to-end encryption for
user-to-user text messaging. Encrypted
messaging prevents anyone from monitoring
your text conversations. Many encrypted
messaging apps also offer end-to-end
encryption for phone calls made using the apps,
as well as for files that are sent using the apps.
26
Resources
https://www.techtarget.com/searchsecurity/definition/cryptography
https://www.guru99.com/difference-encryption-decryption.html
https://bookunitsteacher.com/wp/?p=5914
https://www.w3schools.in/cyber-security/modern-encryption
https://www.educba.com/what-is-encryption/
https://resourcecenter.infinit-o.com/blog/the-5-pillars-of-information-
security-and-how-to-manage-them/
https://backup.ninja/news/database-backups-101-tips-how-verify-
your-backups
https://www.sumologic.com/glossary/authentication-factor/
https://learn.microsoft.com/en-us/windows/security/information-
protection/bitlocker/bitlocker-overview
https://www.techopedia.com/definition/25310/file-hosting-service
https://www.kaspersky.com/resource-center/definitions/what-is-a-
vpn
https://www.investopedia.com/terms/c/cryptocurrency.asp
https://pixelprivacy.com/resources/encrypted-messaging/
27
Thank You!
Data Encryption &
Cryptography
𝐈𝐍𝐅𝐎𝐑𝐌𝐀𝐓𝐈𝐎𝐍𝐀𝐒𝐒𝐔𝐑𝐀𝐍𝐂𝐄𝐀𝐍𝐃𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘
Christian Banlaygas
BSIT - III
Show answer
Auto Play
Slide 1 / 27
SLIDE
Similar Resources on Wayground
20 questions
AI dan Design Grafis
Presentation
•
University
20 questions
CN 5
Presentation
•
University
20 questions
Presentation tips
Presentation
•
University
20 questions
An introduction to ReactJS State
Presentation
•
University
22 questions
ติว o-net ม.3
Presentation
•
KG
20 questions
Part of computer
Presentation
•
KG
19 questions
INGLES 1 - Sesión 2 Greetings and Farewells
Presentation
•
University
19 questions
General Interview Question
Presentation
•
University
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Computers
15 questions
LGBTQ Trivia
Quiz
•
University
36 questions
8th Grade US History STAAR Review
Quiz
•
KG - University
25 questions
5th Grade Science STAAR Review
Quiz
•
KG - University
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
20 questions
5_Review_TEACHER
Quiz
•
University
10 questions
Applications of Quadratic Functions
Quiz
•
10th Grade - University
10 questions
Add & Subtract Mixed Numbers with Like Denominators
Quiz
•
KG - University
20 questions
Block Buster Movies
Quiz
•
10th Grade - Professi...