Your SlideShare is downloading. ×
0
Encriptacion
Encriptacion
Encriptacion
Encriptacion
Encriptacion
Encriptacion
Encriptacion
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Encriptacion

529

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
529
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Cryptography and
  • 2. What is the cryptography? <ul><li>The cryptography is the science of using the mathematics to encrypt and desencriptar information. As soon as the information has been encrypted, it can be stored in a way insecure or sent across an insecure network (as Internet) and nonetheless to remain secret. Then, the information can desencriptarse to his original format. </li></ul>
  • 3. What is the process of encriptación and desencriptación? <ul><li>The encriptación is the process in which the information to protecting is translated into something that seems to be random and that does not have any meaning (the encrypted or ciphered information). The desencriptación is the process into which the encrypted information is converted again to his original form. </li></ul>
  • 4. What is a cryptographic algorithm? <ul><li>A cryptographic algorithm, or person who writes in cipher, is a mathematical function used in the processes of encriptación and desencriptación. A cryptographic algorithm is employed at combination with a key (a number, word, phrase, or password) to encrypt and desencriptar information.
  • 5. To encrypt, the algorithm combines mathematically the information to protecting with a provided key. </li></ul>
  • 6. <ul><li>The result of this calculation it is the encrypted information. For desencriptar, the algorithm does a calculation combining the information encrypted with a provided key, being the result of this combination the information desencriptados. If the key or the information are modified the algorithm it produces a different result. </li></ul>
  • 7. What differences are between the symmetrical algorithms and the asymmetric ones? <ul><li>The symmetrical algorithms encrypt and desencriptan with the same key. The principal advantages of the symmetrical algorithms are his safety and his speed. </li></ul>
  • 8. <ul><li>The asymmetric algorithms encrypt and desencriptan with different keys. The information is encrypted by a public key and desencriptan by a private road, being this one his principal advantage. The asymmetric algorithms, also known as algorithms of public key, need at least a key of 3.000 bits to reach a level of similar safety to of the symmetrical one of 128 bits. And they are incredibly slow, so much that cannot be used to encrypt big quantities of information. </li></ul>

×