SlideShare a Scribd company logo
1 of 7
Download to read offline
How Encryption Works

      S1170048

     Susumu Ito
Introduction to How
     Encryption Works



Ordering something over the Internet,
whether it's a book, a CD or anything else
from an online vendor, or signing up for an
online account, requires entering in a good
deal of sensitive personal information.
Security Encryption
          Systems



Computer encryption is based on the science of
cryptography, which has been used as long as
humans have wanted to keep information secret.
Before the digital age, the biggest users of
cryptography were governments, particularly for
military purposes.
Public Key Encryption
In November 1976, a paper published in the
journal IEEE Transactions on Information
Theory, titled "New Directions in
Cryptography," addressed this problem and
offered up a solution: public-key encryption.
One very popular public-key encryption
program is Pretty Good Privacy (PGP), which
allows you to encrypt almost anything.
SSL and TLS


A popular implementation of public-key encryption
is the Secure Sockets Layer (SSL). Originally
developed by Netscape, SSL is an Internet security
protocol used by Internet browsers and Web
servers to transmit sensitive information. SSL has
become part of an overall security protocol known
as Transport Layer Security (TLS).
Hashing Algorithm
  Input number Hashing algorithm Hash value
    10,667     Input # x 143      1,525,381

You can see how hard it would be to determine
that the value 1,525,381 came from the
multiplication of 10,667 and 143. But if you knew
that the multiplier was 143, then it would be very
easy to calculate the value 10,667. Public-key
encryption is actually much more complex than this
example, but that's the basic idea.
Authentication
â—Ź   Password - The use of a user name and
    password provides the most common form of
    authentication. You enter your name and
    password when prompted by the computer. It
    checks the pair against a secure file to confirm. If
    either the name or the password does not
    match, then you are not allowed further access.
â—Ź   Pass cards - These cards can range from a
    simple card with a magnetic strip, similar to a
    credit card, to sophisticated smart cards that
    have an embedded computer chip.

More Related Content

What's hot

What's hot (11)

Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
s117
s117s117
s117
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Week12
Week12Week12
Week12
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Ss
SsSs
Ss
 

Viewers also liked (20)

Week4 a2
Week4 a2Week4 a2
Week4 a2
 
W11 b
W11 bW11 b
W11 b
 
C w3
C w3C w3
C w3
 
Presentation w6
Presentation w6Presentation w6
Presentation w6
 
C w6
C w6C w6
C w6
 
B w6
B w6B w6
B w6
 
C w3
C w3C w3
C w3
 
Week9 b
Week9 bWeek9 b
Week9 b
 
C w3
C w3C w3
C w3
 
C w3
C w3C w3
C w3
 
C w5
C w5C w5
C w5
 
S P W13
S P W13S P W13
S P W13
 
Espolon Oeste
Espolon OesteEspolon Oeste
Espolon Oeste
 
Green2
Green2Green2
Green2
 
Espolon Oeste
Espolon OesteEspolon Oeste
Espolon Oeste
 
B
BB
B
 
Week10 b
Week10 bWeek10 b
Week10 b
 
Slide w12
Slide w12Slide w12
Slide w12
 
Dia De Los Muertos
Dia De Los MuertosDia De Los Muertos
Dia De Los Muertos
 
Energy Efficiency In The Office
Energy Efficiency In The OfficeEnergy Efficiency In The Office
Energy Efficiency In The Office
 

Similar to Sp W12

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Week12
Week12Week12
Week12
Ma310Shi
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
s1190091
 
Week11
Week11Week11
Week11
0008yuya
 
Week11
Week11Week11
Week11
0008yuya
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 
Week12
Week12Week12
Week12
hiromu
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
Faith Nweke
 

Similar to Sp W12 (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Information Security
Information SecurityInformation Security
Information Security
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Data encryption
Data encryptionData encryption
Data encryption
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Week12
Week12Week12
Week12
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 

More from Susumu Ito

More from Susumu Ito (15)

Week12 b
Week12 bWeek12 b
Week12 b
 
Week7 b
Week7 bWeek7 b
Week7 b
 
Week4 a2
Week4 a2Week4 a2
Week4 a2
 
C w7
C w7C w7
C w7
 
C w4
C w4C w4
C w4
 
C w3
C w3C w3
C w3
 
Peer5
Peer5Peer5
Peer5
 
Peer4
Peer4Peer4
Peer4
 
Peer2
Peer2Peer2
Peer2
 
Peer1
Peer1Peer1
Peer1
 
Slide
SlideSlide
Slide
 
w4_B
w4_Bw4_B
w4_B
 
w4_A
w4_Aw4_A
w4_A
 
Sp W13
Sp W13Sp W13
Sp W13
 
Sp W11
Sp W11Sp W11
Sp W11
 

Recently uploaded

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Sp W12

  • 1. How Encryption Works S1170048 Susumu Ito
  • 2. Introduction to How Encryption Works Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 3. Security Encryption Systems Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes.
  • 4. Public Key Encryption In November 1976, a paper published in the journal IEEE Transactions on Information Theory, titled "New Directions in Cryptography," addressed this problem and offered up a solution: public-key encryption. One very popular public-key encryption program is Pretty Good Privacy (PGP), which allows you to encrypt almost anything.
  • 5. SSL and TLS A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 6. Hashing Algorithm Input number Hashing algorithm Hash value 10,667 Input # x 143 1,525,381 You can see how hard it would be to determine that the value 1,525,381 came from the multiplication of 10,667 and 143. But if you knew that the multiplier was 143, then it would be very easy to calculate the value 10,667. Public-key encryption is actually much more complex than this example, but that's the basic idea.
  • 7. Authentication â—Ź Password - The use of a user name and password provides the most common form of authentication. You enter your name and password when prompted by the computer. It checks the pair against a secure file to confirm. If either the name or the password does not match, then you are not allowed further access. â—Ź Pass cards - These cards can range from a simple card with a magnetic strip, similar to a credit card, to sophisticated smart cards that have an embedded computer chip.