M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.

Slides:



Advertisements
Similar presentations
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
Advertisements

Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Electronic mail security -- Pretty Good Privacy.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Encryption Methods By: Michael A. Scott
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Electronic Mail Security
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
1 Lesson Internet Organization network Fire wall.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Encryption Objective 1: Explain data encryption procedures.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Csci5233 computer security & integrity 1 Cryptography: an overview.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Copyright 2004 MayneStay Consulting Group Ltd. - All Rights Reserved Jan-041 Security using Encryption Security Features Message Origin Authentication.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
8 – Protecting Data and Security
Unit 3 Section 6.4: Internet Security
Grid Security Jinny Chien Academia Sinica Grid Computing.
COMPUTER PRIVACY.
M3: Encryption r By Andrew Stringer.
Public Key Infrastructure
Pooja programmer,cse department
The Secure Sockets Layer (SSL) Protocol
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Electronic Payment Security Technologies
Operating Systems Concepts
Presentation transcript:

M2 Encryption techniques Gladys Nzita-Mak

What is encryption? Encryption is the method of having information such as text being converted into a format that makes no sense, but only to the person who has encrypted it. By having text, images, and other media encrypted, although it doesn’t necessarily prevent hackers, it reduces hackers as they are not able to read the encrypted data, not being able to access it. In order for the content to be available and able to use is that it has to be decrypted (with a decryption key) by the owner, making it accessible to them. Encryption uses public and private keys. As the public key is able to be used by anyone to encrypt any piece of data such as a message being send to a recipient, as it is sent off to the recipient, the recipient is to use the private key in order to be able to decrypt the message that has been sent to them, making them fully accessible to the encrypted message. In an organisation, sending encrypted messages is done as it increases security, for example if an organisation were to send something confidential, they would encrypt the message to make sure it is sent securely to the recipient.

Public key The public key is a key given by the computer and can be viewed by another computer in order to communicate in a secure way with them. With the public key, a user is able to type a message and encrypt it (plain text), being able to send out a secure message to the private key that matches it, for example if a user were to send a message to a recipient, they would encrypt it using the public key, being able to send an encrypted message out to the recipient so that the recipient with a private key can be able to decrypt it making it accessible to them. There are also public key systems that can be used to send encrypted messages, for example PGP (Pretty Good Privacy) is used to securely send encrypted messages using the public and private key system.

Private key Each computer has their own and personal a private key. The private key is used when an encrypted message sent from a user with a public key and in order to decrypt the encrypted message, the private key is used. In order for public keys to send encrypted messages to others, they must have their private key so that they can sent it out to them to have the message decrypted. Examples for using a private key is that they can be used to create/produce digital signatures as part of authenticating messages (public keys verify digital signatures).