Relational-Based Encryption for Efficient Data Sharing on Encrypted Cloud Relational Databases.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you...
-
Upload
anthony-stevenson -
Category
Documents
-
view
226 -
download
0
Transcript of What is Encryption? - The translation of data into a secret code - To read an encrypted file, you...
![Page 1: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/1.jpg)
![Page 2: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/2.jpg)
What is Encryption?
- The translation of data into a secret code
- To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it
- Unencrypted data is called plain text
- encrypted data is referred to as cipher text
![Page 3: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/3.jpg)
Dear students,My phone no.Is 24750331
Ghdu vwxghqwv,Pb skrqh qr.
Lv 57083664
Dear students,My phone no.Is 24750331
Encrypt
Decrypt
Plain text Cipher text
Plain text
![Page 4: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/4.jpg)
Activity
Fgct encuu yg ctg iqkpi vq vcnm cdqwv fcvc gpetarvkqp
Encrypted text:
Original text:
![Page 5: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/5.jpg)
Common algorithms of Encryption
Symmetric Encryption
Asymmetric Encryption
![Page 6: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/6.jpg)
Symmetric Encryption
A type of encryption where the same key is used to encrypt and decrypt the message
![Page 7: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/7.jpg)
Symmetric Encryption (Example)
Plain text 1 0 1 1 0 1 1 0
Key 1 1 0 1 1 1 1 0XOR
Cipher text 0 1 1 0 1 0 0 1
Key 1 1 0 1 1 1 1 0XOR
Plain text 1 0 1 1 0 1 1 0
Encrypt
Decrypt
SameKey
![Page 8: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/8.jpg)
Asymmetric Encryption
Asymmetric encryption (also called public-key encryption) involves a pair of keys - a public and a private key.
The public key is published in a public directory and the corresponding private key is kept secret.
![Page 9: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/9.jpg)
Asymmetric Encryption
The sender of the data encrypts the data with the public key of the receiver
The data can be decrypted only with the private key of the receiver
![Page 10: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/10.jpg)
Asymmetric Encryption
Plain Text
Plain Text
CipherText
![Page 11: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/11.jpg)
How to use two different keys?One key is the inverse of the other:Public key = 3, Private key = 1/3Plain text = 4
Encryption: cipher text = public key * plain text = 3 * 4 = 12
Decryption: plain text = private key * cipher text = 1/3 * 12 = 4
![Page 12: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/12.jpg)
Discussion
What are the uses of encryption?
![Page 13: What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.](https://reader036.fdocuments.in/reader036/viewer/2022082403/56649db35503460f94aa2734/html5/thumbnails/13.jpg)
Activity
Construct a simple algorithm of encryption.