0% found this document useful (0 votes)
323 views14 pages

Encryption

Encryption is a process that converts plain text into ciphertext using an encryption algorithm. There are two main types of encryption: asymmetric and symmetric. Symmetric encryption is faster but less secure, while asymmetric encryption is more complex but more secure. Encryption is widely used to provide authentication, privacy, integrity, and accountability for data on computers and the internet. Both individuals and organizations use encryption to securely transmit private information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
323 views14 pages

Encryption

Encryption is a process that converts plain text into ciphertext using an encryption algorithm. There are two main types of encryption: asymmetric and symmetric. Symmetric encryption is faster but less secure, while asymmetric encryption is more complex but more secure. Encryption is widely used to provide authentication, privacy, integrity, and accountability for data on computers and the internet. Both individuals and organizations use encryption to securely transmit private information.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

ENCRYPTION

By Group 3
Karilyn Lao, Richman Lo, & Robert Mastronardi

What is encryption?

A process that converts original information,


also called plain text into a difficult-tointerpret form called ciphertext.

Done by using an encryption algorithm, a


formula used to turn plain text into
ciphertext.
Two types: Asymmetric and Symmetric

Asymmetric Encryption

Symmetric Encryption

Which one is better?

Although, symmetric encryption is fast, it is


not as safe as asymmetric encryption because
someone could steal the key and decode
the messages. But because of its speed, it's
commonly used for e-commerce transactions.

Asymmetric encryption is more complex--and


more secure. Asymmetric encryption's added
safety comes at a price: More computation is
required, so the process takes longer.

Whos using encryption?

If you use a computer and the internet,


youre using encryption!

Enables all organizations regardless of their


size, to be both user-and-IT friendly.

Why use encryption?

Authentication
Protects

Privacy
Provides

personal data such as passwords.

for confidentiality of private information.

Integrity
Ensures

that a document or file has not been

altered.

Accountability
Prevents

denial or plagiarism.

How do you manage


encryption?

Make sure the encryption system has a


complete key management application.
This

will help manage and protect the data and


keys, and help you safely match encrypted
data with the right key.

Examples of Encryption

Web browser encryption

Email encryption

Hard drive encryption

Operating system protection

A few vendors and their


product coverage

Blackberry
System,

software, hardware, and service.

Global Technologies Group, Inc. (GTGI)


Software

Hewlett-Packard Company
System,

and hardware.

software, hardware, and service.

Intellect Security Ltd.


Software

How prevalent is it?

According to InformationWeek Research:


Of

500 sites surveyed, two-thirds report using encryption to protect


company data.

Of

500 companies surveyed, 43% use encryption on


both stored and transmitted data. More than three
out of five companies encrypt due to the threat of
outsiders intercepting sensitive data.

Continued

Of

28% of sites surveyed, government regulation requires encryption of


stored and transmitted data.

For

38% of companies, the complexity of the technology is an


obstacle.

Some

businesses arent able to use the technology because of the lack of


skilled IT personnel and budget limitations.

Want more???

More on what encryption is

[Link]
[Link]
[Link]
[Link]
[Link]
articleID=6507540
[Link]
[Link]
[Link]
algorithm&i=42595,[Link]

More on vendors and more detailed products

[Link]

Questions???

You might also like