110 likes | 121 Views
Learn about computer encryption and how it secures data using the science of cryptography. Discover symmetric and asymmetric key encryption, as well as important security tools like SSL/TLS and checksums. Explore different types of encryption algorithms and understand the need for encryption in protecting sensitive information.
E N D
Computer encryption is… Based on the science of cryptography
Encryption Padlock Analogy Anybody can lock a padlock… but, it takes a key to unlock it!
Symmetric key encryption In encryption, the word symmetric means those cases where the same key both encrypts and decrypts.
Asymmetric key encryption Type of encryption in which an encryption key (the public key) is used to encrypt a message, and another encryption key (the private key) is used to decrypt the message.
Public Key Security SSLTLS (Secure Sockets Layer) (Transport Layer Security)
Other Security Tools • Checksum • CRC (Cyclic Redundancy Check) If a single character in the data is changed, then the data has been corrupted. Checksum or CRC e4d909c290d0fb1ca068ffaddf22cbd0 Not identical Checksum or CRC 35d91262b3c3ec8841b54169588c97f7
Ciphers or codes = algorithms. Most cryptography used today relies on computers because of the speed and security computers provide in cracking codes.
Hashing Algorithm + = Different Color Alice Alice One-way function* + = Different Color Bob Bob + + = Same Color Alice Alice Bob + = Same Color + Bob Bob Alice *Example of two- way mathematical function = light switch.
Encryption + Authentication • Passwords • Pass cards • Digital Signatures • Fingerprint scan • Retina scan • Face Scan • Voice identification
Why do we need encryption? • Credit-card information • Social Security numbers • Private correspondence • Personal details • Sensitive school information • Bank-account information
But wait…there’s more! • http://btwikilmc.pbworks.com/Encryption • http://www.aptv.org/aptplus/