SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption Works

OUTLINE
When we use the Internet, we're not
always just clicking around and
passively taking in information. For
example, it is reading news articles or
blog posts. A great deal of our time
online involves sending others our own
information.
Information security is provided on computers
and over the Internet by a variety of
methods. The most popular forms of security
all rely on encryption, the process of
encoding information in such a way that only
the person (or computer) with the key can
decode it.
This article is written about learning about
public-key and symmetric-key systems, as well
as hash algorithms.
・Security Encryption Systems


Computer encryption is based on the science
of cryptography, which has been used as long
as humans have wanted to keep information
secret. The Greek historian Plutarch wrote,
for example, about Spartan generals who sent
and received sensitive messages using a
scytale, a thin cylinder made out of wood.
・Symmetric Key


You need two Spartan generals sending
messages to each other, computers using
symmetric-key encryption to send information
between each other must have the same key.
Symmetric-key requires that you know which
computers will be talking to each other so
you can install the key on each one.
The code provides the key to decoding the
message.
・Public Key Encryption



An attacker can easily pluck the
necessary data from the stream. In
November 1976, a paper published in the
journal IEEE Transactions on Information
Theory, titled "New Directions in
Cryptography," addressed this problem
and offered up a solution
In November 1976, a paper published in
the journal IEEE Transactions on
Information Theory, titled "New
Directions in Cryptography," addressed
this problem and offered up a solution.
One very popular public-key encryption
program is Pretty Good Privacy (PGP),
which allows you to encrypt almost
anything.

More Related Content

What's hot

What's hot (9)

How encryption works
How encryption worksHow encryption works
How encryption works
 
Encryption
EncryptionEncryption
Encryption
 
s117
s117s117
s117
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Week13
Week13Week13
Week13
 
Steganography
SteganographySteganography
Steganography
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Ss
SsSs
Ss
 

Viewers also liked

Viewers also liked (16)

Project 5
Project 5Project 5
Project 5
 
Peer Review Exercise 2
Peer Review Exercise 2Peer Review Exercise 2
Peer Review Exercise 2
 
Project 6
Project 6Project 6
Project 6
 
Individual Sections Development Exercise 2
Individual Sections Development Exercise 2Individual Sections Development Exercise 2
Individual Sections Development Exercise 2
 
Individual Sections Development Exercise 5
Individual Sections Development Exercise 5Individual Sections Development Exercise 5
Individual Sections Development Exercise 5
 
How RSS Works
How RSS WorksHow RSS Works
How RSS Works
 
Group presentation
Group presentationGroup presentation
Group presentation
 
R
RR
R
 
Cmap week4
Cmap week4Cmap week4
Cmap week4
 
Cmap week7
Cmap week7Cmap week7
Cmap week7
 
Encryption
EncryptionEncryption
Encryption
 
Complete4
Complete4Complete4
Complete4
 
R S S
R S SR S S
R S S
 
Complete Document Design Exercises 1
Complete Document Design Exercises 1Complete Document Design Exercises 1
Complete Document Design Exercises 1
 
Cmap week5
Cmap week5Cmap week5
Cmap week5
 
ACsJSzKI - Az iskolakert élővilága
ACsJSzKI - Az iskolakert élővilágaACsJSzKI - Az iskolakert élővilága
ACsJSzKI - Az iskolakert élővilága
 

Similar to How Encryption Works

Similar to How Encryption Works (20)

Week12 b
Week12 bWeek12 b
Week12 b
 
Sw2
Sw2Sw2
Sw2
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week11
Week11Week11
Week11
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week12
Week12Week12
Week12
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Encryption
EncryptionEncryption
Encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

More from Masato Nozawa

Peer Review Exercise 5
Peer Review Exercise 5Peer Review Exercise 5
Peer Review Exercise 5Masato Nozawa
 
Complete Document Design Exercises 4
Complete Document Design Exercises 4Complete Document Design Exercises 4
Complete Document Design Exercises 4Masato Nozawa
 
Complete Document Design Exercises 3
Complete Document Design Exercises 3Complete Document Design Exercises 3
Complete Document Design Exercises 3Masato Nozawa
 
Complete Document Design Exercises 1
Complete Document Design Exercises 1Complete Document Design Exercises 1
Complete Document Design Exercises 1Masato Nozawa
 
Individual Sections Development Exercise 4
Individual Sections Development Exercise 4Individual Sections Development Exercise 4
Individual Sections Development Exercise 4Masato Nozawa
 
Individual Sections Development Exercise 3
Individual Sections Development Exercise 3Individual Sections Development Exercise 3
Individual Sections Development Exercise 3Masato Nozawa
 
Individual Sections Development Exercise1
Individual Sections Development Exercise1Individual Sections Development Exercise1
Individual Sections Development Exercise1Masato Nozawa
 
Individual Sections Development Exercise 1
Individual Sections Development Exercise 1Individual Sections Development Exercise 1
Individual Sections Development Exercise 1Masato Nozawa
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption WorksMasato Nozawa
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption WorksMasato Nozawa
 

More from Masato Nozawa (15)

Cmap week6
Cmap week6Cmap week6
Cmap week6
 
Cmap week6
Cmap week6Cmap week6
Cmap week6
 
Cmap week3
Cmap week3Cmap week3
Cmap week3
 
Peer Review Exercise 5
Peer Review Exercise 5Peer Review Exercise 5
Peer Review Exercise 5
 
Complete Document Design Exercises 4
Complete Document Design Exercises 4Complete Document Design Exercises 4
Complete Document Design Exercises 4
 
Complete Document Design Exercises 3
Complete Document Design Exercises 3Complete Document Design Exercises 3
Complete Document Design Exercises 3
 
Complete Document Design Exercises 1
Complete Document Design Exercises 1Complete Document Design Exercises 1
Complete Document Design Exercises 1
 
Individual Sections Development Exercise 4
Individual Sections Development Exercise 4Individual Sections Development Exercise 4
Individual Sections Development Exercise 4
 
Individual4
Individual4Individual4
Individual4
 
Individual Sections Development Exercise 3
Individual Sections Development Exercise 3Individual Sections Development Exercise 3
Individual Sections Development Exercise 3
 
Individual Sections Development Exercise1
Individual Sections Development Exercise1Individual Sections Development Exercise1
Individual Sections Development Exercise1
 
Individual Sections Development Exercise 1
Individual Sections Development Exercise 1Individual Sections Development Exercise 1
Individual Sections Development Exercise 1
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
R S S
R S SR S S
R S S
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

How Encryption Works

  • 1. How Encryption Works OUTLINE When we use the Internet, we're not always just clicking around and passively taking in information. For example, it is reading news articles or blog posts. A great deal of our time online involves sending others our own information.
  • 2. Information security is provided on computers and over the Internet by a variety of methods. The most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person (or computer) with the key can decode it. This article is written about learning about public-key and symmetric-key systems, as well as hash algorithms.
  • 3. ・Security Encryption Systems Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood.
  • 4. ・Symmetric Key You need two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. The code provides the key to decoding the message.
  • 5. ・Public Key Encryption An attacker can easily pluck the necessary data from the stream. In November 1976, a paper published in the journal IEEE Transactions on Information Theory, titled "New Directions in Cryptography," addressed this problem and offered up a solution
  • 6. In November 1976, a paper published in the journal IEEE Transactions on Information Theory, titled "New Directions in Cryptography," addressed this problem and offered up a solution. One very popular public-key encryption program is Pretty Good Privacy (PGP), which allows you to encrypt almost anything.