Top Banner
Encryption
9

Encryption NashProductions

Nov 01, 2014

Download

Technology

Nakash

This PowerPoint is mainly for students doing GCSE ICT. It teaches you about Encryption and SOME of the types of encryption.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Encryption NashProductions

Encryption

Page 2: Encryption NashProductions

Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form also known as plaintext, so it can be understood. It is relied on by the computer security to make sure that no one unauthorized to see the data sees it.

What is it?

Page 3: Encryption NashProductions

Symmetric encryptionThere are two types on encryption, one of

them is: Symmetric encryption, also known as secret key encryption. This is the oldest and best-known technique for encryption. A secret key (in which users share a common key), which can be a number, a word, or just a string of random letters, is applied to the text of a

message to change the content in a particular way. This might be by shifting each letter by a number of places in the alphabet. As long as both sender and

recipient know the secret key, they can encrypt and decrypt all messages that use

this key.

Page 4: Encryption NashProductions

Asymmetric encryption The other type of encryption is:

Asymmetric encryption, this is also known as public key encryption. This is where there are two related keys (a key pair). A public key (where different keys are used for encryption and decryption) is made

freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by

using the matching public key. 

Page 5: Encryption NashProductions

When and whyWhen: Use encryption when you don’t trust both the network and CDP Server and the people that administrate them. However if you do trust them then you may see no benefit in using encryption. Also you  probably don’t need encryption if you have backups of your documents.

Why: The reason why you should use encryption is because is prevents unauthorised access to documents and e-mail messages. along with this it protects data over the network and data stored in the CDP Server. This prevents hackers form getting into your computer and viewing and deleting your very important documents like essays for school work or important documents related to your job which you only have.

Page 6: Encryption NashProductions

The difference

The difference between encryption and programming languages like python and

scratch is that in encryption you are writing a code so no one unauthorised can see what you have wrote. On the other hand, when you write codes in python or scratch you are writing it

so the computer can understand.

Page 7: Encryption NashProductions

References

http://www.pcworld.com/article/15230/article.html

http://support.microsoft.com/kb/246071

http://www.howstuffworks.com/encryption.htm

http://www.google.co.uk/search?q=green+smoke&hl=en&tbm=isch&tbo=u&source=univ&sa=X&ei=l5AnUo-8BMSshQfgjoGIAw&sqi=2&ved=0CFgQsAQ&biw=1280&bih=923#facrc=_&imgdii=_&imgrc=ecquUfSLlV63TM%3A%3BaFDRmIzpufGN0M%3Bhttp%253A%252F%252Ffc02.deviantart.net%252Ffs30%252Ff%252F2008%252F165%252Fd%252F1%252FGreen_Smoke__Tribal_Fire_by_kerodhrone.jpg%3Bhttp%253A%252F%252Fkerodhrone.deviantart.com%252Fart%252FGreen-Smoke-Tribal-Fire-88552207%3B1264%3B918

http://www.google.co.uk/imgres?imgurl=&imgrefurl=http%3A%2F%2Fwww.w3resource.com%2Fpython%2Fpython-tutorial.php&h=0&w=0&sz=1&tbnid=OO5BXHlBkMORMM&tbnh=130&tbnw=387&zoom=1&docid=EYGxQngG_G8lqM&hl=en&ei=sJInUrrrJ6qV0AXp3oGAAg&ved=0CAEQsCU

https://www.google.co.uk/search?q=python&bav=on.2,or.r_qf.&bvm=bv.51495398,d.d2k,pv.xjs.s.en_US.M4-36_38X9A.O&biw=1280&bih=899&um=1&ie=UTF-8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=qpInUtbCB4b27AbwsIG4Cg#hl=en&q=scratch&spell=1&tbm=isch&um=1&facrc=_&imgdii=5BfJMOg2f9G7wM%3A%3BSgavwhkWQq6_fM%3B5BfJMOg2f9G7wM%3A&imgrc=5BfJMOg2f9G7wM%3A%3BZiT_yOnYxLW1gM%3Bhttp%253A%252F%252Fwww.mglworld.com%252Fwp-content%252Fuploads%252F2013%252F04%252FScratchCat-Large.png%3Bhttp%253A%252F%252Fwww.mglworld.com%252Fscratch-2-0-is-great-but-are-schools-ready-for-it%3B2000%3B2000

Page 8: Encryption NashProductions

Please note that Nash Productions only uses sources for research, information and references that are reliable and

accurate. To insure this happens Nash Productions cross checks the data, and

checks if it is a secure source.If you have any problems with the

information or any of the references in this presentation or if you have any other inquiries, then please do not

hesitate in calling Nash Productions inquiry line on: 447404338651

or email us at: [email protected]

Thank You(Nakash Mahmood - founder and

director of Nash Productions)

Note

Page 9: Encryption NashProductions