Cryptography and Data Encryption
Group 07 Members
Introduction to Cryptography.
Courtesy of Google
History of Cryptography.
•Ancient
•World War II
•Modern era
Courtesy of Google
Ancient use
Caesar Cipher
(Rome)
Hello = Khoor
Courtesy of Google
Ancient use
Atbash Cipher
Hebrew culture
Hello = Svool
Ancient use
Scytale Cipher (Ancient
Sparta, Greece)
World War II
The Enigma Machine
(Nazi Germany)
Courtesy of Google
World War II
The Lorenz Cipher
(Germany)
World War II
Japanese Cryptography
The Purple Cipher
Modern era
Hashing Symmetric Key
(Hash Functions)
Asymmetric Key
Courtesy of Google
Goals of Cryptography
Confidentiality Authentication
Integrity
Non-Repudiation Availability
Where You See Cryptography Every Day
Secure Messaging Apps
Secure Email Digital Signature
HTTPS and SSL/TLS for web security
Relation Between Cryptography and Crypto Currency.
Problems in Cryptography & Solutions
3. Performance Issues
Problem: Asymmetric encryption is slow
Solution: Use hybrid encryption (asymmetric for keys, symmetric for data)
4. Outdated Algorithms
Problem: Old algorithms like MD5, SHA-1 are insecure
Solution: Switch to modern algorithms like AES, SHA-256, ECC
5. Quantum Threat
Problem: Quantum computers could break current encryption
Solution: Develop and adopt post-quantum cryptography
Final Thought
Cryptography protects our digital world — from banking to messages.
It's not just about hiding data, it’s about trust, security, and the future.
1. Stay updated. Stay secure.
Introduction to Data Encryption.
Courtesy of Google
Types of Data Encryption
Asymmetric Key
Symmetric Key
Courtesy of Google
Real-World Use Cases of Data
Encryption
Blockchain & Cryptocurrency
End-to-End Encryption
Full Disk Encryption
Courtesy of Google
Blockchain & Cryptocurrency
Courtesy of Google
End-to-End Encryption
Courtesy of Google
Full Disk Encryption
Courtesy of Google
Future Trends in Encryption
Post-Quantum Cryptography Homomorphic Encryption
Courtesy of Google
Challenges in Data Encryption
Weak Encryption Algorithms
Challenge: Old algorithms like DES or MD5 are easy for hackers to crack.
Solution: Switch to secure, modern algorithms like AES-256, RSA-2048, or ECC.
Human Error
Challenge: Mistakes in coding or managing encryption weaken security.
Solution: Train developers, use strong passwords, and automate encryption processes.
End-to-End Encryption Conflicts
Challenge: Encryption can block legal or law enforcement access to data.
Solution: Create laws that balance user privacy with lawful access needs.
Final Thought
Encryption is key to protecting data, but it must be strong, error-free, and aligned with privacy and legal
needs to work effectively.
Courtesy of Google
THANK
YOU