What is Encryption

2
What is Encryption? Basic Definition: scrambling data using a code or formula, known as a cipher <-textbook defininition ensures that it is hidden from those who do not have the unlocking key <- textbook definition encounter it everyday, used for security, assurance and trust. Even now we are making use of encryption through eduroam. Two main types of encryption Symmetric-key ciphers – encryption method uses the same key/secret for encrypting and decryption messages. AES technology. Faster, simple, less resource intensive. Anyone reading between the stages of encryption and decryption will just see this jumped up string Encrypted string nh0s0bLvwxsHd6v3KGcEV6TygdlAuKcOiIb62EY2zoA= Secret Key: secretkey Unencrypted string: My secret message. Asymmetric cryptographer – consists of two keys that are mathematically linked, known as the public and private key. These are both simultaneously generated at the time. More resource intensive and slower. RSA has been a very popular one so far.

description

eawfwfwa

Transcript of What is Encryption

Page 1: What is Encryption

What is Encryption?

Basic Definition:scrambling data using a code or formula, known as a cipher <-textbook defininition

ensures that it is hidden from those who do not have the unlocking key <- textbook definition

encounter it everyday, used for security, assurance and trust. Even now we are making use of encryption through eduroam.

Two main types of encryption

Symmetric-key ciphers – encryption method uses the same key/secret for encrypting and decryption messages. AES technology. Faster, simple, less resource intensive.

Anyone reading between the stages of encryption and decryption will just see this jumped up string

Encrypted string nh0s0bLvwxsHd6v3KGcEV6TygdlAuKcOiIb62EY2zoA=

Secret Key: secretkey

Unencrypted string: My secret message.

Asymmetric cryptographer – consists of two keys that are mathematically linked, known as the public and private key. These are both simultaneously generated at the time. More resource intensive and slower. RSA has been a very popular one so far.

The best analogy for a public key is you are given an infinite number of padlocks. You have the ability to lock objects with the padlock but no ability to unlock it.

Now imagine the private key which is the key to the padlock. This has the ability to unlock it. This has to be kept confidential as opposed to the public key, which is exposed to everyone.

Computationally inefficient to guess private keysha256 hash 15 trillion hashes per second with world’s fastest supercomputer

Page 2: What is Encryption

0.65 billion billion years to crack

Example on how it works:

In many cases, these two types of encryption are used simultaneously. One instance is SSL technology