SlideShare a Scribd company logo
1 of 6
Section A


            ・ 5 Keywords
- encryption
- scytale
- key
- symmetric-key
- hashing algorithm
・ 3 sentences from the article
●   Information security is provided on
    computers and over the Internet
    by a variety of methods.

●   The Greek historian Plutarch wrote,
    for example, about Spartan generals
    who sent and received sensitive
    messages using a scytale, a thin
    cylinder made out of wood.
・The important thing about a hash value
is that it is nearly impossible to derive
the original input number without
knowing the data used to create the
hash value.
・Why are these sentences
           important?
・The ssentence is very important .
First sentence is explaining about
encryption works .There are a whole lot
of information .Fof example,Credit-card
information,Social
Securitynumbers,Private
correspondence,Personal
details,Sensitive company
information,Bank-account information .
・Secound sentences is writing about
symmetric key.User uses individual
secret key ( cord ).It is sent over the
network to another computer ,and the
key join another secret key.This way is
very safety and very convenient.

・Third sentences is writing about
hashing algorithm. The key in pbulic
key encryption is usig on a hash
value.A hashing algorithm is usig it of all
others.It is important for us to
to derive the original input number
without knowing the data used to create
the hash value.

So,I think that the 3 sentences are
important.

More Related Content

Similar to SW wwe12 Section A

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
 

Similar to SW wwe12 Section A (20)

Week12
Week12Week12
Week12
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Information Security
Information SecurityInformation Security
Information Security
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Week12
Week12Week12
Week12
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Week12
Week12Week12
Week12
 

SW wwe12 Section A

  • 1. Section A ・ 5 Keywords - encryption - scytale - key - symmetric-key - hashing algorithm
  • 2. ・ 3 sentences from the article ● Information security is provided on computers and over the Internet by a variety of methods. ● The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood.
  • 3. ・The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.
  • 4. ・Why are these sentences important? ・The ssentence is very important . First sentence is explaining about encryption works .There are a whole lot of information .Fof example,Credit-card information,Social Securitynumbers,Private correspondence,Personal details,Sensitive company information,Bank-account information .
  • 5. ・Secound sentences is writing about symmetric key.User uses individual secret key ( cord ).It is sent over the network to another computer ,and the key join another secret key.This way is very safety and very convenient. ・Third sentences is writing about hashing algorithm. The key in pbulic key encryption is usig on a hash value.A hashing algorithm is usig it of all others.It is important for us to
  • 6. to derive the original input number without knowing the data used to create the hash value. So,I think that the 3 sentences are important.