SlideShare uma empresa Scribd logo
1 de 11
Encryption Presented By: Aaina katyal
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is encryption necessary? ,[object Object],[object Object],[object Object]
Benefits of Data Encryption   ,[object Object],[object Object]
Process
How to encrypt a file   ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Mais conteúdo relacionado

Mais procurados

Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networksKajal Chaudhari
 
How encryption works
How encryption worksHow encryption works
How encryption workss1200019
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project reviewAmit Debnath
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
Password protected Document.
Password protected Document.Password protected Document.
Password protected Document.MDAZAD53
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptographyAshish Kumar
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careJessica C. Gardner
 
Week13presen
Week13presenWeek13presen
Week13presens1160131
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Worksray0510711s
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
How encryption works
How encryption worksHow encryption works
How encryption worksMariko Saitoh
 

Mais procurados (19)

Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networks
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Tresorit intro - Europas 2014
Tresorit intro - Europas 2014Tresorit intro - Europas 2014
Tresorit intro - Europas 2014
 
Email encryption project review
Email encryption project reviewEmail encryption project review
Email encryption project review
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Password protected Document.
Password protected Document.Password protected Document.
Password protected Document.
 
Sw2 week12
Sw2 week12Sw2 week12
Sw2 week12
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
SSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should careSSL: What is it, How to do it, and Why you should care
SSL: What is it, How to do it, and Why you should care
 
Week13presen
Week13presenWeek13presen
Week13presen
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Week12
Week12Week12
Week12
 
Sp W12
Sp W12Sp W12
Sp W12
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 

Destaque

Tarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanovaTarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanovaaquasportclubs
 
設計研究方法-觀察法
設計研究方法-觀察法設計研究方法-觀察法
設計研究方法-觀察法Judy Liu+
 
CIARD RING - Gamze Doğan
CIARD RING - Gamze DoğanCIARD RING - Gamze Doğan
CIARD RING - Gamze Doğangamze_01
 
How ‪Crowdsourcing‬ Disrupts The Interior Design
How ‪Crowdsourcing‬ Disrupts The Interior DesignHow ‪Crowdsourcing‬ Disrupts The Interior Design
How ‪Crowdsourcing‬ Disrupts The Interior DesignFederico Schiano di Pepe
 
CMS (content management system)
CMS (content management system)CMS (content management system)
CMS (content management system)aaina_katyal
 
The results of experts interview
The results of experts interviewThe results of experts interview
The results of experts interviewJudy Liu+
 
2014 Tokyo trip sharing
2014 Tokyo trip sharing2014 Tokyo trip sharing
2014 Tokyo trip sharingJudy Liu+
 
Introduction
IntroductionIntroduction
IntroductionJudy Liu+
 
Report on printers
Report on printersReport on printers
Report on printersaaina_katyal
 
Extreme programming
Extreme programmingExtreme programming
Extreme programmingaaina_katyal
 
Italy 海外自助遊學經驗分享 by Judy Liu
Italy 海外自助遊學經驗分享 by Judy LiuItaly 海外自助遊學經驗分享 by Judy Liu
Italy 海外自助遊學經驗分享 by Judy LiuJudy Liu+
 
Chapter 4 chromatography_b_2010
Chapter 4 chromatography_b_2010Chapter 4 chromatography_b_2010
Chapter 4 chromatography_b_2010drs_swylam
 
Cuentos centroamericanos (seleccion)[1]
Cuentos centroamericanos (seleccion)[1]Cuentos centroamericanos (seleccion)[1]
Cuentos centroamericanos (seleccion)[1]Dany Bocarando
 

Destaque (19)

Tarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanovaTarifes balneo 2012 estètica i wellness aqua vilanova
Tarifes balneo 2012 estètica i wellness aqua vilanova
 
設計研究方法-觀察法
設計研究方法-觀察法設計研究方法-觀察法
設計研究方法-觀察法
 
CIARD RING - Gamze Doğan
CIARD RING - Gamze DoğanCIARD RING - Gamze Doğan
CIARD RING - Gamze Doğan
 
How ‪Crowdsourcing‬ Disrupts The Interior Design
How ‪Crowdsourcing‬ Disrupts The Interior DesignHow ‪Crowdsourcing‬ Disrupts The Interior Design
How ‪Crowdsourcing‬ Disrupts The Interior Design
 
CMS (content management system)
CMS (content management system)CMS (content management system)
CMS (content management system)
 
The results of experts interview
The results of experts interviewThe results of experts interview
The results of experts interview
 
2014 Tokyo trip sharing
2014 Tokyo trip sharing2014 Tokyo trip sharing
2014 Tokyo trip sharing
 
Introduction
IntroductionIntroduction
Introduction
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
The Future Of Work
The Future Of Work The Future Of Work
The Future Of Work
 
Report on printers
Report on printersReport on printers
Report on printers
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Extreme programming
Extreme programmingExtreme programming
Extreme programming
 
Italy 海外自助遊學經驗分享 by Judy Liu
Italy 海外自助遊學經驗分享 by Judy LiuItaly 海外自助遊學經驗分享 by Judy Liu
Italy 海外自助遊學經驗分享 by Judy Liu
 
Chapter 4 chromatography_b_2010
Chapter 4 chromatography_b_2010Chapter 4 chromatography_b_2010
Chapter 4 chromatography_b_2010
 
Intel
IntelIntel
Intel
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Cuentos centroamericanos (seleccion)[1]
Cuentos centroamericanos (seleccion)[1]Cuentos centroamericanos (seleccion)[1]
Cuentos centroamericanos (seleccion)[1]
 

Semelhante a Encryption_ppt

Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6sabtolinux
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptxkarthikvcyber
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptxjohn6938
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Confidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptxConfidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptxAbdihafidFarahAhmed1
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryptionAlireza Ghahrood
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfVAIBHAVCHAKRAWARTI
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryptionAncy Mariam Babu
 

Semelhante a Encryption_ppt (20)

Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Confidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptxConfidentiality and Privacy Controls.pptx
Confidentiality and Privacy Controls.pptx
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Cryptography
CryptographyCryptography
Cryptography
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Encryption_ppt