SlideShare a Scribd company logo
1
Lecture No. 5: Data Encryption
Lecturer: Dr. Mazin Alkathiri
Department of Information Technology
,
College of Computers
Seiyun University
September , 2024
2
1. Historical Context of Encryption
• Encryption has been used for centuries as a method to protect
confidential information. Ancient civilizations such as the Egyptians,
Greeks, and Romans developed early encryption techniques to secure
military and diplomatic communications.
• One of the earliest known methods was the Caesar Cipher, used by
Julius Caesar, where each letter in a message was shifted a fixed
number of spaces.
• The evolution of encryption technologies accelerated significantly
during the 20th century with the advent of computers, allowing for
the development of complex algorithms that could quickly encrypt
and decrypt data.
3
2. The Purpose of Data Encryption
The primary aim of data encryption is to ensure data privacy and
protect sensitive information from unauthorized access, tampering, and
theft. This protection is essential in the context of modern cyber threats, as
data is often transmitted over networks that can be vulnerable to
interception. Encryption serves several core purposes:
• Confidentiality: Ensures that data can only be read by the intended
recipients.
• Integrity: Helps verify that data has not been altered or tampered with.
• Authentication: Confirms the identity of the parties involved in data
exchange.
• Non-repudiation: Ensures that the sender cannot deny sending the data,
thus establishing trust.
Data Encryption
•Encryption is a security method in which information is encoded in such a
way that only authorized user can read it.
Encryption/Decryption
plaintext
encryption
ciphertext
decryption
plaintext
• Plaintext: a message in its original form
• Ciphertext: a message in the transformed, unrecognized form
• Encryption: the process for producing ciphertext from plaintext
• Decryption: the reverse of encryption
• Key: a secret value used to control encryption/decryption
• Data encryption methods are generally categorized into two main
types:
1. Symmetric Encryption: This encryption method uses a single key for
both encryption and decryption. The key must be kept secret and
shared securely between the sender and the receiver. While
symmetric encryption is fast and efficient, it presents challenges in
securely sharing the key. Common algorithms include:
• AES (Advanced Encryption Standard): Widely used in various applications for
its strength and speed.
• DES (Data Encryption Standard) and Triple DES: Older methods that have
mostly been replaced by AES due to vulnerabilities.
3. Types of Encryption
•Symmetric key encryption algorithm uses same cryptographic keys for both encryption and
decryption of cipher text.
Symmetric Key encryption
plaintext
encryption
ciphertext
decryption
plaintext
key key
same key
8
2. Asymmetric Encryption: Also known as public-key encryption, this
method uses a pair of keys – a public key, which is shared openly,
and a private key, which is kept secret. Data encrypted with the
public key can only be decrypted with the private key, and vice
versa. This method is commonly used for secure communication
and digital signatures. Examples include:
• RSA (Rivest–Shamir–Adleman): One of the earliest and most commonly used
algorithms for secure data exchange.
• ECC (Elliptic Curve Cryptography): Known for providing strong security with
smaller key sizes, making it more efficient than RSA in some applications.
•Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is
public. These two keys are mathematically linked with each other.
Public Key encryption
plaintext
encryption
ciphertext
decryption
plaintext
public key private key
10
6. Challenges in Data Encryption
Although encryption provides robust security, it also poses certain challenges:
• Key Management: Safeguarding and distributing keys securely is critical; if
keys are compromised, encrypted data becomes vulnerable.
• Performance and Efficiency: Strong encryption can impact system
performance, especially for large datasets or resource-constrained devices.
• Compliance and Legal Issues: Organizations are often required to comply
with data protection regulations that mandate specific encryption
standards, such as GDPR, HIPAA, and PCI-DSS.
• Quantum Computing Threat: Emerging quantum computing technology
could potentially break many current encryption algorithms, leading to
research in quantum-resistant encryption techniques.
In terms of security, hashing is a technique used to encrypt data
and generate unpredictable hash values. It is the hash function
that generates the hash code, which helps to protect the security
of transmission from unauthorized users.
Hashing
• provides a way to verify that the message received is the same
as the message sent. It can take a plain text message as input
and then computes a value based on that message.
• Key Points
• The length of computed value is much shorter than the original
message.
• It is possible that different plain text messages could generate the
same value.
Hashing algorithm
13
Applications of Hashing
• Data Integrity Verification
• Password Storage
• Digital Signatures and Certificates
• Blockchain Technology
• is an electronic, encrypted, stamp of authentication on digital information such as email
messages, or electronic documents. A signature confirms that the information originated
from the signer and has not been altered.
• Signing certificate To create a digital signature, you need a signing certificate, which
proves identity.
• When you send a digitally-signed macro or document, you also send your certificate and public key.
• Certificates are issued by a certification authority, and like a driver’s license, can be revoked.
• A certificate is usually valid for a year, after which, the signer must renew, or get a new, signing
certificate to establish identity.
Digital Signature
Computer Introduction (Data Encryption)-Lecture05
• There are several reasons to implement digital signatures to
communications:
• Authentication: Digital signatures help to authenticate the
sources of messages.
• Integrity: Once the message is signed, any change in the
message would invalidate the signature.
• Non-repudiation: By this property, any entity that has signed
some information cannot at a later time deny having signed
it.
Applications
• is a barrier between Local Area Network (LAN) and the Internet.
It allows keeping private resources confidential and minimizes
the security risks. It controls network traffic, in both directions.
• The following diagram depicts a sample firewall between LAN
and the internet. The connection between the two is the point of
vulnerability. Both hardware and the software can be used at
this point to filter network traffic.
Firewall
Computer Introduction (Data Encryption)-Lecture05
• Firewall management must be addressed by both system
managers and the network managers.
• The amount of filtering a firewall varies. For the same
firewall, in different directions.
Key Points to Firewall

More Related Content

Similar to Computer Introduction (Data Encryption)-Lecture05 (20)

PPTX
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
PPT
Encryption
Naiyan Noor
 
PPTX
Network security
ABHISHEK KUMAR
 
PDF
Tokenization vs Encryption Difference Explained.pdf
imoliviabennett
 
PPTX
501 ch 10 cryptography
Toyeeb Onimole
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PPT
Cryptography cse,ru
Hossain Md Shakhawat
 
DOCX
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
PPT
Encryption technology
Neha Bhambu
 
PPT
Crypt
Mir Majid
 
PPTX
Unit 7 : Network Security
Chandan Gupta Bhagat
 
PPTX
Encryption in Cryptography
Uttara University
 
PPT
Cryptography
amiable_indian
 
PPTX
Encryption by fastech
Abdulafeez Fasasi
 
PPT
Ch12 Cryptography it-slideshares.blogspot.com
phanleson
 
PDF
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
PPT
Java Crypto
phanleson
 
PPTX
Security
Saqib Shehzad
 
PPTX
Cryptography Key Management.pptx
SurendraBasnet6
 
PDF
Cscu module 04 data encryption
Sejahtera Affif
 
Cryptography and Network Security Principles.pptx
AbrahamThompson3
 
Encryption
Naiyan Noor
 
Network security
ABHISHEK KUMAR
 
Tokenization vs Encryption Difference Explained.pdf
imoliviabennett
 
501 ch 10 cryptography
Toyeeb Onimole
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography cse,ru
Hossain Md Shakhawat
 
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
Encryption technology
Neha Bhambu
 
Crypt
Mir Majid
 
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Encryption in Cryptography
Uttara University
 
Cryptography
amiable_indian
 
Encryption by fastech
Abdulafeez Fasasi
 
Ch12 Cryptography it-slideshares.blogspot.com
phanleson
 
Fundamentals of Cryptography: Securing Data in the Digital Age
avengersimran16
 
Java Crypto
phanleson
 
Security
Saqib Shehzad
 
Cryptography Key Management.pptx
SurendraBasnet6
 
Cscu module 04 data encryption
Sejahtera Affif
 

More from Dr. Mazin Mohamed alkathiri (20)

PPTX
Computer Introduction (Operating Systems)-Lecture06
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Application Development (local database) class-07
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Application Development (Shared Preferences) class-06
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Application Development((Handling User Input and Navigation) class-05
Dr. Mazin Mohamed alkathiri
 
PPTX
Computer Introduction (Computer Viruses )-Lecture04
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Applications Development class 04-Layout-04
Dr. Mazin Mohamed alkathiri
 
DOCX
Appendix to Lecture 3 Building a flutter app
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Applications Development class 03-starting with flutter
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Applications Development class 02 ntroduction to Drat
Dr. Mazin Mohamed alkathiri
 
PPTX
Computer Introduction (Software)-Lecture03
Dr. Mazin Mohamed alkathiri
 
PPTX
Computer Introduction (Hardware)-Lecture02
Dr. Mazin Mohamed alkathiri
 
PPTX
Computer Introduction (introduction)-Lecture01
Dr. Mazin Mohamed alkathiri
 
PPTX
Introduction to Academic Writing class 0-1
Dr. Mazin Mohamed alkathiri
 
PPTX
Mobile Applications Development class 01 - Introduction
Dr. Mazin Mohamed alkathiri
 
PPT
OS-operating systems- ch05 (CPU Scheduling) ...
Dr. Mazin Mohamed alkathiri
 
PPTX
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
Dr. Mazin Mohamed alkathiri
 
PPTX
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
 
PPTX
ESSENTIAL of (CS/IT/IS) class 06 (database)
Dr. Mazin Mohamed alkathiri
 
PPT
OS-operating systems- ch04 (Threads) ...
Dr. Mazin Mohamed alkathiri
 
PPTX
Advance Mobile Application Development class 05
Dr. Mazin Mohamed alkathiri
 
Computer Introduction (Operating Systems)-Lecture06
Dr. Mazin Mohamed alkathiri
 
Mobile Application Development (local database) class-07
Dr. Mazin Mohamed alkathiri
 
Mobile Application Development (Shared Preferences) class-06
Dr. Mazin Mohamed alkathiri
 
Mobile Application Development((Handling User Input and Navigation) class-05
Dr. Mazin Mohamed alkathiri
 
Computer Introduction (Computer Viruses )-Lecture04
Dr. Mazin Mohamed alkathiri
 
Mobile Applications Development class 04-Layout-04
Dr. Mazin Mohamed alkathiri
 
Appendix to Lecture 3 Building a flutter app
Dr. Mazin Mohamed alkathiri
 
Mobile Applications Development class 03-starting with flutter
Dr. Mazin Mohamed alkathiri
 
Mobile Applications Development class 02 ntroduction to Drat
Dr. Mazin Mohamed alkathiri
 
Computer Introduction (Software)-Lecture03
Dr. Mazin Mohamed alkathiri
 
Computer Introduction (Hardware)-Lecture02
Dr. Mazin Mohamed alkathiri
 
Computer Introduction (introduction)-Lecture01
Dr. Mazin Mohamed alkathiri
 
Introduction to Academic Writing class 0-1
Dr. Mazin Mohamed alkathiri
 
Mobile Applications Development class 01 - Introduction
Dr. Mazin Mohamed alkathiri
 
OS-operating systems- ch05 (CPU Scheduling) ...
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
Dr. Mazin Mohamed alkathiri
 
OS-operating systems- ch04 (Threads) ...
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 05
Dr. Mazin Mohamed alkathiri
 
Ad

Recently uploaded (20)

PPTX
How to use grouped() method in Odoo 18 - Odoo Slides
Celine George
 
PPTX
How to use _name_search() method in Odoo 18
Celine George
 
PPTX
2025 Completing the Pre-SET Plan Form.pptx
mansk2
 
PDF
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
PDF
Andreas Schleicher_Teaching Compass_Education 2040.pdf
EduSkills OECD
 
PDF
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
PPTX
Project 4 PART 1 AI Assistant Vocational Education
barmanjit380
 
PPTX
Elo the HeroTHIS IS A STORY ABOUT A BOY WHO SAVED A LITTLE GOAT .pptx
JoyIPanos
 
PPTX
Martyrs of Ireland - who kept the faith of St. Patrick.pptx
Martin M Flynn
 
PPTX
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
PDF
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
PDF
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
PPTX
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
 
DOCX
DLL english grade five goof for one week
FlordelynGonzales1
 
PDF
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
PPTX
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
PDF
VCE Literature Section A Exam Response Guide
jpinnuck
 
PPTX
JSON, XML and Data Science introduction.pptx
Ramakrishna Reddy Bijjam
 
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
PPTX
How to Add New Item in CogMenu in Odoo 18
Celine George
 
How to use grouped() method in Odoo 18 - Odoo Slides
Celine George
 
How to use _name_search() method in Odoo 18
Celine George
 
2025 Completing the Pre-SET Plan Form.pptx
mansk2
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
Andreas Schleicher_Teaching Compass_Education 2040.pdf
EduSkills OECD
 
Our Guide to the July 2025 USPS® Rate Change
Postal Advocate Inc.
 
Project 4 PART 1 AI Assistant Vocational Education
barmanjit380
 
Elo the HeroTHIS IS A STORY ABOUT A BOY WHO SAVED A LITTLE GOAT .pptx
JoyIPanos
 
Martyrs of Ireland - who kept the faith of St. Patrick.pptx
Martin M Flynn
 
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
 
DLL english grade five goof for one week
FlordelynGonzales1
 
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
VCE Literature Section A Exam Response Guide
jpinnuck
 
JSON, XML and Data Science introduction.pptx
Ramakrishna Reddy Bijjam
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
How to Add New Item in CogMenu in Odoo 18
Celine George
 
Ad

Computer Introduction (Data Encryption)-Lecture05

  • 1. 1 Lecture No. 5: Data Encryption Lecturer: Dr. Mazin Alkathiri Department of Information Technology , College of Computers Seiyun University September , 2024
  • 2. 2 1. Historical Context of Encryption • Encryption has been used for centuries as a method to protect confidential information. Ancient civilizations such as the Egyptians, Greeks, and Romans developed early encryption techniques to secure military and diplomatic communications. • One of the earliest known methods was the Caesar Cipher, used by Julius Caesar, where each letter in a message was shifted a fixed number of spaces. • The evolution of encryption technologies accelerated significantly during the 20th century with the advent of computers, allowing for the development of complex algorithms that could quickly encrypt and decrypt data.
  • 3. 3 2. The Purpose of Data Encryption The primary aim of data encryption is to ensure data privacy and protect sensitive information from unauthorized access, tampering, and theft. This protection is essential in the context of modern cyber threats, as data is often transmitted over networks that can be vulnerable to interception. Encryption serves several core purposes: • Confidentiality: Ensures that data can only be read by the intended recipients. • Integrity: Helps verify that data has not been altered or tampered with. • Authentication: Confirms the identity of the parties involved in data exchange. • Non-repudiation: Ensures that the sender cannot deny sending the data, thus establishing trust.
  • 4. Data Encryption •Encryption is a security method in which information is encoded in such a way that only authorized user can read it.
  • 5. Encryption/Decryption plaintext encryption ciphertext decryption plaintext • Plaintext: a message in its original form • Ciphertext: a message in the transformed, unrecognized form • Encryption: the process for producing ciphertext from plaintext • Decryption: the reverse of encryption • Key: a secret value used to control encryption/decryption
  • 6. • Data encryption methods are generally categorized into two main types: 1. Symmetric Encryption: This encryption method uses a single key for both encryption and decryption. The key must be kept secret and shared securely between the sender and the receiver. While symmetric encryption is fast and efficient, it presents challenges in securely sharing the key. Common algorithms include: • AES (Advanced Encryption Standard): Widely used in various applications for its strength and speed. • DES (Data Encryption Standard) and Triple DES: Older methods that have mostly been replaced by AES due to vulnerabilities. 3. Types of Encryption
  • 7. •Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption of cipher text. Symmetric Key encryption plaintext encryption ciphertext decryption plaintext key key same key
  • 8. 8 2. Asymmetric Encryption: Also known as public-key encryption, this method uses a pair of keys – a public key, which is shared openly, and a private key, which is kept secret. Data encrypted with the public key can only be decrypted with the private key, and vice versa. This method is commonly used for secure communication and digital signatures. Examples include: • RSA (Rivest–Shamir–Adleman): One of the earliest and most commonly used algorithms for secure data exchange. • ECC (Elliptic Curve Cryptography): Known for providing strong security with smaller key sizes, making it more efficient than RSA in some applications.
  • 9. •Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is public. These two keys are mathematically linked with each other. Public Key encryption plaintext encryption ciphertext decryption plaintext public key private key
  • 10. 10 6. Challenges in Data Encryption Although encryption provides robust security, it also poses certain challenges: • Key Management: Safeguarding and distributing keys securely is critical; if keys are compromised, encrypted data becomes vulnerable. • Performance and Efficiency: Strong encryption can impact system performance, especially for large datasets or resource-constrained devices. • Compliance and Legal Issues: Organizations are often required to comply with data protection regulations that mandate specific encryption standards, such as GDPR, HIPAA, and PCI-DSS. • Quantum Computing Threat: Emerging quantum computing technology could potentially break many current encryption algorithms, leading to research in quantum-resistant encryption techniques.
  • 11. In terms of security, hashing is a technique used to encrypt data and generate unpredictable hash values. It is the hash function that generates the hash code, which helps to protect the security of transmission from unauthorized users. Hashing
  • 12. • provides a way to verify that the message received is the same as the message sent. It can take a plain text message as input and then computes a value based on that message. • Key Points • The length of computed value is much shorter than the original message. • It is possible that different plain text messages could generate the same value. Hashing algorithm
  • 13. 13 Applications of Hashing • Data Integrity Verification • Password Storage • Digital Signatures and Certificates • Blockchain Technology
  • 14. • is an electronic, encrypted, stamp of authentication on digital information such as email messages, or electronic documents. A signature confirms that the information originated from the signer and has not been altered. • Signing certificate To create a digital signature, you need a signing certificate, which proves identity. • When you send a digitally-signed macro or document, you also send your certificate and public key. • Certificates are issued by a certification authority, and like a driver’s license, can be revoked. • A certificate is usually valid for a year, after which, the signer must renew, or get a new, signing certificate to establish identity. Digital Signature
  • 16. • There are several reasons to implement digital signatures to communications: • Authentication: Digital signatures help to authenticate the sources of messages. • Integrity: Once the message is signed, any change in the message would invalidate the signature. • Non-repudiation: By this property, any entity that has signed some information cannot at a later time deny having signed it. Applications
  • 17. • is a barrier between Local Area Network (LAN) and the Internet. It allows keeping private resources confidential and minimizes the security risks. It controls network traffic, in both directions. • The following diagram depicts a sample firewall between LAN and the internet. The connection between the two is the point of vulnerability. Both hardware and the software can be used at this point to filter network traffic. Firewall
  • 19. • Firewall management must be addressed by both system managers and the network managers. • The amount of filtering a firewall varies. For the same firewall, in different directions. Key Points to Firewall