Lecture#6- Data Encryption
Lecture#6- Data Encryption
For example:
If a corporate-owned device is misplaced or stolen, the data stored
on it will most likely be secure if the hard drive is properly
encrypted.
This method works best for closed systems, which have less risk of a third-
party intrusion.
On the positive side, symmetric encryption is faster than asymmetric
encryption. However, on the negative side, both parties need to make sure
the key is stored securely and available only to the software that needs to use
it.
• As the name implies, the public key is freely available to anyone, whereas
the private key remains with the intended recipients only, who need it to
decipher the messages. Both keys are simply large numbers that aren’t
identical but are paired with each other, which is where the “asymmetric”
part comes in.
• Now that we have gone through the types of data encryption techniques,
let us next learn the specific encryption algorithms.
University of Education, Lahore
Encryption Algorithms
Encryption algorithms are used to convert data into ciphertext. By
using the encryption key, an algorithm can alter data in a
predictable manner, resulting in the encrypted data appearing
random, but it can be converted back into plaintext by using the
decryption key.
• It’s symmetric encryption that was once the most widely used
symmetric algorithm in the industry, though it’s being gradually
phased out.