How Encryption Works  1.Introduction to How Encryption Works  When we use it Internet, we read such a news peg and blogart...
2.Security Encryption Systems  When you search for a Web page on the Internet, your requesis routed though your ISP to the...
3. Symmetric Key  Text and other files that need to remain perfectly intactduring the compression process use lossless com...
4. Public Key Encryption  When you combat this drag, high-speed dial-up providershave bundled a pop-up blocker into the so...
5. SSL and TLS  It would seem that a clever combination of fairlystraightforward technologies has helped to overcome some ...
6. Hashing Algorithm   The key of the public key encryption is based on a hash level.This is a value calculated from the i...
Upcoming SlideShare
Loading in …5
×

sw-of-12

274
-1

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
274
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

sw-of-12

  1. 1. How Encryption Works 1.Introduction to How Encryption Works When we use it Internet, we read such a news peg and blogarticle, and it is necessary online, to send information ofanother person of our own with a lot of at the time of - uswho I always just click it here and there, and do not take theinformation passively. The information security is offered on ina computer and the Internet by various methods. I am simple,but a method of simple security is that an upper confidentialinformation maintains it.
  2. 2. 2.Security Encryption Systems When you search for a Web page on the Internet, your requesis routed though your ISP to the Web. After making a series ofstops along the way at machines that help find the page yourelooking for, your machine is connected to the computer thatserves the Web page you requested. When you search for aWeb page using high-speed dial-up, your request is sent fromthe dial-up modem in your computer to the ISPs accelerationserver. Now the acceleration server is requesting and servingpages on your behalf.
  3. 3. 3. Symmetric Key Text and other files that need to remain perfectly intactduring the compression process use lossless compression.Once they are uncompressed, the files return to their originalstate. When these files are uncompressed, they are not exactlyas they were before compression. They have lost some of theoriginal data in the process. The loss in quality may not beimportant to the user when weighed against the increase inspeed gained through the compression process.
  4. 4. 4. Public Key Encryption When you combat this drag, high-speed dial-up providershave bundled a pop-up blocker into the software they send tosubscribers. This pop-up blocker is programmed to recognizethose lines of code that spell out the ad parameters. When itsees those tell-tale lines of code, it rejects the ads request tobe displayed. What this amounts to is less information beingsent across the phone line to your machine. The less data thatis sent, the faster the load time.
  5. 5. 5. SSL and TLS It would seem that a clever combination of fairlystraightforward technologies has helped to overcome some ofthe speed bumps of dial-up Internet. These advances serve toprolong the life of dial-up Internet and provide an alternativefor those who are tired of standard dial-up but not quite readyfor the leap to broadband. If these advances continue, dial-upmay be here to stay for quite a while. For more information onhigh-speed dial-up and related topics, check out the links onthe next page.
  6. 6. 6. Hashing Algorithm The key of the public key encryption is based on a hash level.This is a value calculated from the input number of the baseusing hash algorithm. The hash level is an abstract of theoriginal value basically. Even if the important point about thehash level does not know the data which are used to make ahash level, I am that it is almost impossible to derive thenumber of the original input. The public key coding is much really more complicated, butit is a basic way of thinking.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×