SlideShare a Scribd company logo
1 of 17
Data encryption SMS Hasan (Sharqi) (BSc)
Computer Science Teacher - Cambridge Section
Yara International School, Riyadh - KSA
hasan.edu21@gmail.com
+966 57 087 58 28
24-NOV-2021
Data encryption
• Internet is world wide network
• We exchange a lot of private data on the internet.
– Email credentials
– Credit card numbers
– Private messages
– Passwords
• It is important to keep the data safe from
eavesdroppers during data transmission.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 2
Keywords
Encryption: is a
method of
protecting data
during the data
transmission.
Eavesdroppers:
The people who
intercept and
read our data
during the data
transmission such
as hackers.
What is called data
encryption?
• Data encryption is a process of scrambling data
(message) into human unreadable format before
the transmission takes place.
• This is sometimes called cryptography.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 3
Keywords
Scrambling:
mixing up and
making confusing.
Cryptography: is
the study of
secure
communications
techniques that
allow only the
sender and
intended
recipient of a
message to view
its contents.
Data encryption
simulation
Activity:
• Use the simulation tool available in the below
link to find how encryption works really.
https://www.online-toolz.com/tools/text-
encryption-decryption.php
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 4
Keywords
Simulation: is a
way of seeing a
thing happen
without it actually
taking place in
the same way.
Data encryption…
• Before the encryption takes place, the data is called
plain-text.
• Then, an encryption algorithm (encryption key) is
applied to the data to scramble and make it
meaningless, this data will be called ciphertext.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 5
Keywords
Plain-text: the
name given to
data before the
encryption
Cipher-text: the
name given to
data after the
encryption
Algorithm: step
by step procedure
to solve a
problem.
plaintext
encryption key
ciphertext
Data encryption…
• Now, the ciphertext will be transmitted from
sender to receiver.
• In the end, once the receiver, received the data,
will decrypt the data from ciphertext to plain
text using the decryption key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 6
Keywords
Sender: the
device which
sends the data
from.
Receiver: the
device which
receives the data
from the sender.
Decryption: the
process of
converting the
data from
ciphertext to
plaintext.
Data encryption simulation
Activity:
• Use the simulation tool available in the below
link to find how encryption works really.
https://codebeautify.org/encrypt-decrypt
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 7
Keywords
Simulation: is a
way of seeing a
thing happen
without it actually
taking place in
the same way.
Question in context
• Does encryption stop data being stolen by a
hacker?
– No, It will not stop a hacker from stealing the
data, but the data will be unreadable.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 8
Types of data encryption
1. Symmetric data encryption.
2. Asymmetric data encryption
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 9
Types of data encryption –
1. Symmetric data encryption
1. Symmetric data encryption.
– Uses an encryption key: the same key used to
encrypt and decrypt the data.
Example: 10 digit encryption key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 10
plaintext
encryption key
ciphertext
Data encryption simulation –
Symmetric encryption
Activity:
• Use the simulation tool available in the below
link to find how symmetric encryption works
really.
https://codebeautify.org/encrypt-decrypt
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 11
Symmetric data encryption -
Question in context
• Is this enough to keep the data safe?
– No, because in a symmetric encryption, a
single key is shared between sender and the
receiver.
– It is a matter of seconds for the modern
computers to decode an encrypted message
using a single key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 12
Keywords
Decode:
Metaphor of the
decryption.
2. Asymmetric data encryption.
– Uses different keys for encrypting and
decrypting the data.
• Public key = (Available for everyone)
• Private key = (Only available for the receiver’s
computer)
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 13
Keywords
Public key: a key
which is made
available by the
receiver to the
sender to send
the data.
Private key: a key
which is available
in the receiver’s
computer only to
decrypt the data
that arrived from
the sender.
Step 01 Step 02
Types of data encryption –
2. Asymmetric data encryption
Data encryption simulation –
Asymmetric encryption
Activity:
• Use the simulation tool available in the below
link to find how asymmetric encryption works
really.
https://www.javainuse.com/rsagenerator
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 14
Asymmetric data encryption -
Question in context
• Is this enough to keep the data safe?
– This method is more than enough to keep the data
safe because the private key will be available only on
the receiver's computer which is used to decrypt the
message.
– The senders will send the message to the receivers
using public key only, no one knows the receiver’s
private key.
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 15
Q & A
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 16
Thank you
5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 17

More Related Content

Similar to Data encryption.pptx

A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
04 authentication
04 authentication04 authentication
04 authenticationJadavsejal
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and CryptographyJack Davis
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxskknowledge
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 

Similar to Data encryption.pptx (20)

A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
04 authentication
04 authentication04 authentication
04 authentication
 
Security
SecuritySecurity
Security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Network Security: Standards and Cryptography
Network Security: Standards and CryptographyNetwork Security: Standards and Cryptography
Network Security: Standards and Cryptography
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Lec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptxLec # 7 Symmetric and asymmetric cryptography.pptx
Lec # 7 Symmetric and asymmetric cryptography.pptx
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
s117
s117s117
s117
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Data encryption.pptx

  • 1. Data encryption SMS Hasan (Sharqi) (BSc) Computer Science Teacher - Cambridge Section Yara International School, Riyadh - KSA hasan.edu21@gmail.com +966 57 087 58 28 24-NOV-2021
  • 2. Data encryption • Internet is world wide network • We exchange a lot of private data on the internet. – Email credentials – Credit card numbers – Private messages – Passwords • It is important to keep the data safe from eavesdroppers during data transmission. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 2 Keywords Encryption: is a method of protecting data during the data transmission. Eavesdroppers: The people who intercept and read our data during the data transmission such as hackers.
  • 3. What is called data encryption? • Data encryption is a process of scrambling data (message) into human unreadable format before the transmission takes place. • This is sometimes called cryptography. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 3 Keywords Scrambling: mixing up and making confusing. Cryptography: is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
  • 4. Data encryption simulation Activity: • Use the simulation tool available in the below link to find how encryption works really. https://www.online-toolz.com/tools/text- encryption-decryption.php 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 4 Keywords Simulation: is a way of seeing a thing happen without it actually taking place in the same way.
  • 5. Data encryption… • Before the encryption takes place, the data is called plain-text. • Then, an encryption algorithm (encryption key) is applied to the data to scramble and make it meaningless, this data will be called ciphertext. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 5 Keywords Plain-text: the name given to data before the encryption Cipher-text: the name given to data after the encryption Algorithm: step by step procedure to solve a problem. plaintext encryption key ciphertext
  • 6. Data encryption… • Now, the ciphertext will be transmitted from sender to receiver. • In the end, once the receiver, received the data, will decrypt the data from ciphertext to plain text using the decryption key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 6 Keywords Sender: the device which sends the data from. Receiver: the device which receives the data from the sender. Decryption: the process of converting the data from ciphertext to plaintext.
  • 7. Data encryption simulation Activity: • Use the simulation tool available in the below link to find how encryption works really. https://codebeautify.org/encrypt-decrypt 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 7 Keywords Simulation: is a way of seeing a thing happen without it actually taking place in the same way.
  • 8. Question in context • Does encryption stop data being stolen by a hacker? – No, It will not stop a hacker from stealing the data, but the data will be unreadable. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 8
  • 9. Types of data encryption 1. Symmetric data encryption. 2. Asymmetric data encryption 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 9
  • 10. Types of data encryption – 1. Symmetric data encryption 1. Symmetric data encryption. – Uses an encryption key: the same key used to encrypt and decrypt the data. Example: 10 digit encryption key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 10 plaintext encryption key ciphertext
  • 11. Data encryption simulation – Symmetric encryption Activity: • Use the simulation tool available in the below link to find how symmetric encryption works really. https://codebeautify.org/encrypt-decrypt 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 11
  • 12. Symmetric data encryption - Question in context • Is this enough to keep the data safe? – No, because in a symmetric encryption, a single key is shared between sender and the receiver. – It is a matter of seconds for the modern computers to decode an encrypted message using a single key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 12 Keywords Decode: Metaphor of the decryption.
  • 13. 2. Asymmetric data encryption. – Uses different keys for encrypting and decrypting the data. • Public key = (Available for everyone) • Private key = (Only available for the receiver’s computer) 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 13 Keywords Public key: a key which is made available by the receiver to the sender to send the data. Private key: a key which is available in the receiver’s computer only to decrypt the data that arrived from the sender. Step 01 Step 02 Types of data encryption – 2. Asymmetric data encryption
  • 14. Data encryption simulation – Asymmetric encryption Activity: • Use the simulation tool available in the below link to find how asymmetric encryption works really. https://www.javainuse.com/rsagenerator 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 14
  • 15. Asymmetric data encryption - Question in context • Is this enough to keep the data safe? – This method is more than enough to keep the data safe because the private key will be available only on the receiver's computer which is used to decrypt the message. – The senders will send the message to the receivers using public key only, no one knows the receiver’s private key. 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 15
  • 16. Q & A 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 16
  • 17. Thank you 5-Jan-23 SMSHasan (Sharqi) (BSc) | hasan.edu21@gmail.com | +966 57 087 5828 17