Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Hello class!

Computer science project


Created by:

Ozdemir, erhun, cemil, kayra


Topic: encryption
What is encryption?
Encryption is the process of converting plain, readable data (referred to
as plaintext) into an encoded, unreadable format using a mathematical
algorithm and a secret key.

The purpose of encryption is to protect sensitive information from


being read or accessed by unauthorized users.
In encryption, the plaintext is transformed through a series of complex operations into
ciphertext, which can only be decrypted back to its original form using the correct
decryption key.

Encryption is commonly used to secure data that is


transmitted over the internet, such as financial transactions,
personal messages, and login credentials.
There are many different encryption algorithms, ranging from simple ones such
as Caesar cipher to highly advanced ones such as AES (Advanced Encryption
Standard). The choice of encryption algorithm depends on the level of security
required, the amount of data being encrypted, and other factors.
what purposes Encryption is used for?

Encryption is used for various purposes, but its main purpose is to


provide secure communication and protect sensitive information
from unauthorized access. FOR INSTANCE:
Securing Communication: Encryption is used to secure communication channels such as
email, instant messaging, and voice calls. By encrypting the messages, the
communication is made secure, and only the intended recipient can read the message.
Protecting Data: Encryption is used to protect sensitive data such as credit card
information, passwords, and personal data stored on computers or mobile devices. By
encrypting the data, even if it is stolen or hacked, it will be unreadable to anyone
without the decryption key.
Confidentiality: Encryption is used to ensure the confidentiality of sensitive
documents such as legal agreements, medical records, and financial statements.
By encrypting the documents, only authorized personnel with the decryption key
can access the information.

Compliance: Encryption is used to comply with various regulations and standards


such as HIPAA, GDPR, and PCI-DSS. These regulations require that sensitive
information be protected through encryption to ensure its security and privacy.
encryption plays a huge role in securing digital
communication and protecting sensitive information from
cyber threats.
how can we encrypt our own data?

There are many ways to encrypt data, depending on the type of data and the level
of security required. Ways such as:
Software Encryption: One of the easiest ways to encrypt data is to use software
encryption tools. Most operating systems have built-in encryption tools that allow you
to encrypt individual files or folders. There are also many third-party encryption
software tools available that offer more advanced features.
Hardware Encryption: Hardware encryption involves using special
devices such as USB drives, external hard drives, or hardware security
modules (HSMs) to encrypt data. Hardware encryption is typically more
secure than software encryption, as the encryption keys are stored on a
separate physical device.
Cloud Encryption: Cloud encryption involves encrypting data that is stored in the
cloud, such as files stored on cloud storage services like Dropbox or Google Drive.
Many cloud storage providers offer built-in encryption features, and there are also
third-party encryption tools available that can encrypt data before it is uploaded to the
cloud.
End-to-End Encryption: End-to-end encryption is a method of encrypting
data that is transmitted between two parties. In this method, the data is
encrypted at the sender's end, and it remains encrypted until it reaches the
recipient's end. End-to-end encryption is commonly used for secure
messaging apps such as WhatsApp and Signal.
data encryption requires the use of a cryptographic algorithm and a secret encryption
key. The encryption key is used to encrypt the data, and a matching decryption key is
used to decrypt the data back to its original form. It is important to choose a strong
encryption algorithm and to keep the encryption key secure.
Our team project
we have been able to easily encrypt a PDF file with a password ! , in
order to protect it from the eyes of unwanted individuals

And we want to teach you how !


In order to encrypt your pdf file with a password , first you need to go to
this website : https://smallpdf.com/protect-pdf
Then , you need to drag the PDF file into
the website
After that, you need to type the password you want to use
Now your file is ready and can be
downloaded
As you can see , our pdf file is now encrypted and its
needs a password to open
Thanks for your attention ,
have a lovely day

You might also like