Top Banner
ENCRYPTION By Group 3 Karilyn Lao, Richman Lo, & Robert Mastronardi
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Encryption

ENCRYPTIONBy Group 3

Karilyn Lao, Richman Lo, & Robert Mastronardi

Page 2: Encryption

What is encryption?

A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext.

Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.

Two types: Asymmetric and Symmetric

Page 3: Encryption

Asymmetric Encryption

Page 4: Encryption

Symmetric Encryption

Page 5: Encryption

Which one is better?

Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions.

Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.

Page 6: Encryption

Who’s using encryption?

If you use a computer and the internet, you’re using encryption!

Enables all organizations regardless of their size, to be both user-and-IT friendly.

Page 7: Encryption

Why use encryption?

Authentication Protects personal data such as passwords.

Privacy Provides for confidentiality of private information.

Accountability Prevents denial or plagiarism.

Integrity Ensures that a document or file has not been

altered.

Page 8: Encryption

How do you manage encryption? Make sure the encryption system has a

complete key management application. This will help manage and protect the data and

keys, and help you safely match encrypted data with the right key.

Page 9: Encryption

Examples of Encryption

Web browser encryption

Email encryption

Hard drive encryption

Operating system protection

Page 10: Encryption

A few vendors and their product coverage Blackberry

System, software, hardware, and service.

Global Technologies Group, Inc. (GTGI) Software and hardware.

Hewlett-Packard Company System, software, hardware, and service.

Intellect Security Ltd. Software

Page 11: Encryption

How prevalent is it?

According to InformationWeek Research: Of 500 sites surveyed, two-thirds report using encryption to protect

company data.

Of 500 companies surveyed, 43% use encryption on both stored and transmitted data. More than three out of five companies encrypt due to the threat of outsiders intercepting sensitive data.

Continued…

Page 12: Encryption

Of 28% of sites surveyed, government regulation requires encryption of stored and transmitted data.

For 38% of companies, the complexity of the technology is an obstacle.

Some businesses aren’t able to use the technology because of the lack of skilled IT personnel and budget limitations.

Page 13: Encryption

Want more???

More on what encryption is… http://cplus.about.com/od/introductiontoprogramming/p/

encryption.htm http://www.pcworld.com/article/id,15230/article.html http://www.encyclopedia.com/doc/1G1-144388099.html http://www.informationweek.com/news/showArticle.jhtml?

articleID=6507540 http://security.homeoffice.gov.uk/ripa/encryption/types-of-

encryption/ http://www.itworld.com/nl/unix_sec/01242002/ http://www.pcmag.com/encyclopedia_term/

0,2542,t=encryption+algorithm&i=42595,00.asp

More on vendors and more detailed products… http://securitypark.bitpipe.com/olist/Data-Encryption.html

Page 14: Encryption

Questions???