Top Banner
ENCRYPTION DECRYPTION OF EMAIL By shashank singhal Under supervision of Dr. Krishna Asawa
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Encryption-Decryption of Email

ENCRYPTION DECRYPTION OF EMAIL

By shashank singhal

Under supervision of Dr. Krishna Asawa

Page 2: Encryption-Decryption of Email

What is encryption?

A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext.

Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.

Two types: Asymmetric and Symmetric

Page 3: Encryption-Decryption of Email

Asymmetric Encryption

Page 4: Encryption-Decryption of Email

Symmetric Encryption

Page 5: Encryption-Decryption of Email

Which one is better?

Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions.

Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.

Page 6: Encryption-Decryption of Email

Who’s using encryption?

If you use a computer and the internet, you’re using encryption!

Enables all organizations regardless of their size, to be both user-and-IT friendly.

Page 7: Encryption-Decryption of Email

Why use encryption?

Authentication Protects personal data such as passwords.

Privacy Provides for confidentiality of private

information.

Accountability Prevents denial or plagiarism.

Integrity Ensures that a document or file has not been

altered.

Page 8: Encryption-Decryption of Email

How do you manage encryption? Make sure the encryption system has a

complete key management application. This will help manage and protect the data and

keys, and help you safely match encrypted data with the right key.

Page 9: Encryption-Decryption of Email

Examples of Encryption

Web browser encryption

Email encryption

Hard drive encryption

Operating system protection

Page 10: Encryption-Decryption of Email

A few vendors and their product coverage Blackberry

System, software, hardware, and service.

Global Technologies Group, Inc. (GTGI) Software and hardware.

Hewlett-Packard Company System, software, hardware, and service.

Intellect Security Ltd. Software

Page 11: Encryption-Decryption of Email

How prevalent is it?

According to InformationWeek Research: Of 500 sites surveyed, two-thirds report using

encryption to protect company data.

Of 500 companies surveyed, 43% use encryption on both stored and transmitted data. More than three out of five companies encrypt due to the threat of outsiders intercepting sensitive data.

Continued…

Page 12: Encryption-Decryption of Email

Of 28% of sites surveyed, government regulation requires encryption of stored and transmitted data.

For 38% of companies, the complexity of the technology is an obstacle.

Some businesses aren’t able to use the technology because of the lack of skilled IT personnel and budget limitations.

Page 13: Encryption-Decryption of Email

Want more???

More on what encryption is… http://cplus.about.com/od/introductiontoprogramming/p/encryp

tion.htm http://www.pcworld.com/article/id,15230/article.html http://www.encyclopedia.com/doc/1G1-144388099.html http://www.informationweek.com/news/showArticle.jhtml?articl

eID=6507540 http://security.homeoffice.gov.uk/ripa/encryption/types-of-encry

ption/ http://www.itworld.com/nl/unix_sec/01242002/ http://www.pcmag.com/encyclopedia_term/0,2542,t=encryption

+algorithm&i=42595,00.asp

More on vendors and more detailed products…

http://securitypark.bitpipe.com/olist/Data-Encryption.html

Page 14: Encryption-Decryption of Email

Questions???