SlideShare a Scribd company logo
1 of 6
Download to read offline
HOW ENCRYPTION WORKS
S1180012
Kawasaki Chiaki
INTRODUCTION
   There's a whole lot of information that we don't
    want other people to see.
     Credit-card information
     Social Security numbers
     Private correspondence    etc
   Information security is provided on computers and
    over the Internet by a variety of methods. A
    simple but straightforward security method is to
    only keep sensitive information on removable
    storage media like portable flash memory drives or
    external hard drives. But the most popular forms
    of security all rely on encryption, the process of
    encoding information in such a way that only the
    person (or computer) with the key can decode it.
SECURITY ENCRYPTION SYSTEMS
   Most forms of cryptography in use these days rely on
    computers, simply because a human-based code is too
    easy for a computer to crack. Ciphers are also better
    known today as algorithms, which are the guides for
    encryption -- they provide a way in which to craft a
    message and give a certain range of possible
    combinations. A key, on the other hand, helps a person
    or computer figure out the one possibility on a given
    occasion.
   Computer encryption systems generally belong in one
    of two categories.
     Symmetric-key encryption
     Public-key encryption


In the following sections, we'll learn about each of these
  systems.
SYMMETRIC KEY
   In symmetric-key encryption, each computer
    has a secret key (code) that it can use to
    encrypt a packet of information before it is
    sent over the network to another computer.
    Symmetric-key requires that you know which
    computers will be talking to each other so you
    can install the key on each one. Symmetric-
    key encryption is essentially the same as a
    secret code that each of the two computers
    must know in order to decode the information.
    The code provides the key to decoding the
    message.
PUBLIC KEY ENCRYPTION
   public-key encryption uses two different keys at once --
    a combination of a private key and a public key. The
    private key is known only to your computer, while the
    public key is given by your computer to any computer
    that wants to communicate securely with it. To decode
    an encrypted message, a computer must use the public
    key, provided by the originating computer, and its own
    private key. Although a message sent from one
    computer to another won't be secure since the public
    key used for encryption is published and available to
    anyone, anyone who picks it up can't read it without the
    private key. The key pair is based on prime numbers of
    long length. This makes the system extremely secure,
    because there is essentially an infinite number of prime
    numbers available, meaning there are nearly infinite
    possibilities for keys. One very popular public-key
    encryption program is Pretty Good Privacy (PGP), which
    allows you to encrypt almost anything.
SSL AND TLS
   A popular implementation of public-key encryption
    is the Secure Sockets Layer (SSL). Originally
    developed by Netscape, SSL is an Internet security
    protocol used by Internet browsers and Web
    servers to transmit sensitive information. SSL has
    become part of an overall security protocol known
    as Transport Layer Security (TLS).
   TLS and its predecessor SSL make significant use
    of certificate authorities. Once your browser
    requests a secure page and adds the "s" onto
    "http," the browser sends out the public key and
    the certificate, checking three things
     1.   that the certificate comes from a trusted party
     2.   that the certificate is currently valid
     3.   that the certificate has a relationship with the site
          from which it's coming

More Related Content

What's hot (15)

Week12
Week12Week12
Week12
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Eng12
Eng12Eng12
Eng12
 
SW Week12
SW Week12 SW Week12
SW Week12
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Data encryption
Data encryptionData encryption
Data encryption
 
無題 1
無題 1無題 1
無題 1
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
fucking shit
fucking shitfucking shit
fucking shit
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Encryption
EncryptionEncryption
Encryption
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 

Viewers also liked

How rss works
How rss worksHow rss works
How rss workss1180012
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist workss1180012
 
Portfolio
PortfolioPortfolio
Portfoliocsnrsj
 
Poduzetnistvo obrazac za izradu prezentacija
Poduzetnistvo obrazac za izradu prezentacijaPoduzetnistvo obrazac za izradu prezentacija
Poduzetnistvo obrazac za izradu prezentacijaBojan Ivanovic
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist workss1180012
 
Team afobaka start up plan
Team afobaka start up planTeam afobaka start up plan
Team afobaka start up plans1180012
 
2013 12 10 Social Media in the Control Room
2013 12 10 Social Media in the Control Room2013 12 10 Social Media in the Control Room
2013 12 10 Social Media in the Control RoomManfred Blaha
 
How technology change the business
How technology change the businessHow technology change the business
How technology change the businesss1180012
 
Team afobaka start up plan(English homework)
Team afobaka start up plan(English homework)Team afobaka start up plan(English homework)
Team afobaka start up plan(English homework)s1180012
 
Kosenconf numazu Free Session5
Kosenconf numazu Free Session5Kosenconf numazu Free Session5
Kosenconf numazu Free Session5Yuichiro Kobayashi
 
How fiber optic work
How fiber optic workHow fiber optic work
How fiber optic works1180012
 
Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)surajitkundu
 
Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)surajitkundu
 
Breast (Mammary gland)
Breast (Mammary gland)Breast (Mammary gland)
Breast (Mammary gland)surajitkundu
 

Viewers also liked (19)

How rss works
How rss worksHow rss works
How rss works
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist works
 
Portfolio
PortfolioPortfolio
Portfolio
 
Poduzetnistvo obrazac za izradu prezentacija
Poduzetnistvo obrazac za izradu prezentacijaPoduzetnistvo obrazac za izradu prezentacija
Poduzetnistvo obrazac za izradu prezentacija
 
How craigslist works
How craigslist worksHow craigslist works
How craigslist works
 
Team afobaka start up plan
Team afobaka start up planTeam afobaka start up plan
Team afobaka start up plan
 
2013 12 10 Social Media in the Control Room
2013 12 10 Social Media in the Control Room2013 12 10 Social Media in the Control Room
2013 12 10 Social Media in the Control Room
 
How technology change the business
How technology change the businessHow technology change the business
How technology change the business
 
Team afobaka start up plan(English homework)
Team afobaka start up plan(English homework)Team afobaka start up plan(English homework)
Team afobaka start up plan(English homework)
 
Kosenconf numazu Free Session5
Kosenconf numazu Free Session5Kosenconf numazu Free Session5
Kosenconf numazu Free Session5
 
How fiber optic work
How fiber optic workHow fiber optic work
How fiber optic work
 
Uncertainty avoidance
Uncertainty avoidanceUncertainty avoidance
Uncertainty avoidance
 
Warisan budaya
Warisan budayaWarisan budaya
Warisan budaya
 
Bone
BoneBone
Bone
 
Cartilage
CartilageCartilage
Cartilage
 
Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)
 
Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)Deep cervical fascia (fascia colli)
Deep cervical fascia (fascia colli)
 
Breast (Mammary gland)
Breast (Mammary gland)Breast (Mammary gland)
Breast (Mammary gland)
 
Cartilage
CartilageCartilage
Cartilage
 

Similar to How encryption works

Similar to How encryption works (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week11
Week11Week11
Week11
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Sw2
Sw2Sw2
Sw2
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Week12
Week12Week12
Week12
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Encryption
EncryptionEncryption
Encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

How encryption works

  • 2. INTRODUCTION  There's a whole lot of information that we don't want other people to see.  Credit-card information  Social Security numbers  Private correspondence etc  Information security is provided on computers and over the Internet by a variety of methods. A simple but straightforward security method is to only keep sensitive information on removable storage media like portable flash memory drives or external hard drives. But the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person (or computer) with the key can decode it.
  • 3. SECURITY ENCRYPTION SYSTEMS  Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion.  Computer encryption systems generally belong in one of two categories.  Symmetric-key encryption  Public-key encryption In the following sections, we'll learn about each of these systems.
  • 4. SYMMETRIC KEY  In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric- key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. PUBLIC KEY ENCRYPTION  public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. Although a message sent from one computer to another won't be secure since the public key used for encryption is published and available to anyone, anyone who picks it up can't read it without the private key. The key pair is based on prime numbers of long length. This makes the system extremely secure, because there is essentially an infinite number of prime numbers available, meaning there are nearly infinite possibilities for keys. One very popular public-key encryption program is Pretty Good Privacy (PGP), which allows you to encrypt almost anything.
  • 6. SSL AND TLS  A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).  TLS and its predecessor SSL make significant use of certificate authorities. Once your browser requests a secure page and adds the "s" onto "http," the browser sends out the public key and the certificate, checking three things 1. that the certificate comes from a trusted party 2. that the certificate is currently valid 3. that the certificate has a relationship with the site from which it's coming