Your SlideShare is downloading. ×
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply



Published on

Published in: Technology, Business

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. How Encryption Works 1.Introduction to How Encryption Works When we use it Internet, we read such a news peg and blogarticle, and it is necessary online, to send information ofanother person of our own with a lot of at the time of - uswho I always just click it here and there, and do not take theinformation passively. The information security is offered on ina computer and the Internet by various methods. I am simple,but a method of simple security is that an upper confidentialinformation maintains it.
  • 2. 2.Security Encryption Systems When you search for a Web page on the Internet, your requesis routed though your ISP to the Web. After making a series ofstops along the way at machines that help find the page yourelooking for, your machine is connected to the computer thatserves the Web page you requested. When you search for aWeb page using high-speed dial-up, your request is sent fromthe dial-up modem in your computer to the ISPs accelerationserver. Now the acceleration server is requesting and servingpages on your behalf.
  • 3. 3. Symmetric Key Text and other files that need to remain perfectly intactduring the compression process use lossless compression.Once they are uncompressed, the files return to their originalstate. When these files are uncompressed, they are not exactlyas they were before compression. They have lost some of theoriginal data in the process. The loss in quality may not beimportant to the user when weighed against the increase inspeed gained through the compression process.
  • 4. 4. Public Key Encryption When you combat this drag, high-speed dial-up providershave bundled a pop-up blocker into the software they send tosubscribers. This pop-up blocker is programmed to recognizethose lines of code that spell out the ad parameters. When itsees those tell-tale lines of code, it rejects the ads request tobe displayed. What this amounts to is less information beingsent across the phone line to your machine. The less data thatis sent, the faster the load time.
  • 5. 5. SSL and TLS It would seem that a clever combination of fairlystraightforward technologies has helped to overcome some ofthe speed bumps of dial-up Internet. These advances serve toprolong the life of dial-up Internet and provide an alternativefor those who are tired of standard dial-up but not quite readyfor the leap to broadband. If these advances continue, dial-upmay be here to stay for quite a while. For more information onhigh-speed dial-up and related topics, check out the links onthe next page.
  • 6. 6. Hashing Algorithm The key of the public key encryption is based on a hash level.This is a value calculated from the input number of the baseusing hash algorithm. The hash level is an abstract of theoriginal value basically. Even if the important point about thehash level does not know the data which are used to make ahash level, I am that it is almost impossible to derive thenumber of the original input. The public key coding is much really more complicated, butit is a basic way of thinking.