SlideShare a Scribd company logo
1 of 6
Download to read offline
INDIVIDUAL ASSIGNMENT


 How Encryption Works

            s1170002 Yu Arai
How Encryption Works
                Symmetric Key


 In symmetric-key encryption, each computer has a
secret key (code) that it can use to encrypt a
packet of information before it is sent over the
network to another computer. Symmetric-key
requires that you know which computers will be
talking to each other so you can install the key
on each one. Symmetric-key encryption is
essentially the same as a secret code that each
of the two computers must know in order to decode
the information. The code provides the key to
decoding the message.
5 key words
1.Key
2.Symmetric
3.Encryption
4.Decode
5.secret code
3 sentences
1.A great deal of our time online involves
  sending others our own information.
2.The private key is known only to your
  computer.
3.The key pair is based on prime numbers
  (numbers that only have divisors of
  itself and one, such as 2, 3, 5, 7, 11
  and so on) of long length.
Why are these sentences
important?
1.Because signing up for an online
  account, requires entering in a good
  deal of sensitive personal information.
2.To decode an encrypted message, a
  computer must use the public key,
  provided by the originating computer,
  and its own private key.
3.These are important informations.
Reading



http://computer.howstuffworks.com/encryption.htm



           (Person # 1 in the group)

More Related Content

What's hot

What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
lmadison10
 

What's hot (16)

Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 
Email security
Email securityEmail security
Email security
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
 
Telegram
TelegramTelegram
Telegram
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Ntewrok secuirty cs1
Ntewrok secuirty cs1Ntewrok secuirty cs1
Ntewrok secuirty cs1
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Assignment 4
Assignment 4Assignment 4
Assignment 4
 
Email security & threads
Email security & threadsEmail security & threads
Email security & threads
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher Shannon and 5 good criteria of a good cipher
Shannon and 5 good criteria of a good cipher
 

Viewers also liked (7)

09062015_phdlist
09062015_phdlist09062015_phdlist
09062015_phdlist
 
Computer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And EncryptionComputer Viruses, Biometrics, And Encryption
Computer Viruses, Biometrics, And Encryption
 
Computer System Hardware Arabelle Capito
Computer System Hardware Arabelle CapitoComputer System Hardware Arabelle Capito
Computer System Hardware Arabelle Capito
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Presentation on input devices...
Presentation on input devices... Presentation on input devices...
Presentation on input devices...
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

Similar to How Encryption Works

How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 
SW Week12
SW Week12 SW Week12
SW Week12
s1190087
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
 
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxLecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
smile790243
 

Similar to How Encryption Works (20)

week 12
week 12week 12
week 12
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
SW Week12
SW Week12 SW Week12
SW Week12
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Week12
Week12Week12
Week12
 
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docxLecture 10Chapter 10ImplementingE-commerce Securit.docx
Lecture 10Chapter 10ImplementingE-commerce Securit.docx
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Eng12
Eng12Eng12
Eng12
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 

How Encryption Works

  • 1. INDIVIDUAL ASSIGNMENT How Encryption Works s1170002 Yu Arai
  • 2. How Encryption Works Symmetric Key In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. 3 sentences 1.A great deal of our time online involves sending others our own information. 2.The private key is known only to your computer. 3.The key pair is based on prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length.
  • 5. Why are these sentences important? 1.Because signing up for an online account, requires entering in a good deal of sensitive personal information. 2.To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. 3.These are important informations.