SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption for Strong
         Security Work



Member:
s1160138 Wataru Tamura
s1160139 Ryo Tayama
s1160140 Kiyoto Tanji
s1160142 Satoshi Tsuchida
Networks use encryption for strong security



    Data encryption
●




    File encryption
●




    Link encryption
●
Data encryption


    A data encryption
●

    program uses a string
     of numbers called a
    key.
    A key create a stream
●

    of data combining the
    real information with
    a pseudorandom
    stream of bits.
File encryption


    File encryption protects files in central servers
●

    and mass-storage devices from being read or
    changed without an encryption key.
    Local file encryption also protects data from
●

    physical instruction.
Link encryption


    The PC's encrypted
●

    data, enclosed in
    unencrypted TCP/IP
    and Ethernet packets,
    crosses the network.
    Routers can use
●

    encryption between
    themselves to protect
    the entire stream of
    data.
Reference


    http://www.softdesignz.com/nav/images/secretkey.gif
●



    http://mkpe.com/digital_cinema/images/phase_2_sm.gif
●

More Related Content

What's hot

Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless NetworksMichael Boman
 
Pretty good privacy - Email Security
Pretty good privacy - Email SecurityPretty good privacy - Email Security
Pretty good privacy - Email SecurityRakesh Mittal
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01Qaisar Ayub
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5limsh
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-SniffingAn Dy L
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsDarraghCommsec
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyAdri Jovin
 

What's hot (17)

Week13
Week13Week13
Week13
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
Week13 Presen
Week13 PresenWeek13 Presen
Week13 Presen
 
Cisco security
Cisco securityCisco security
Cisco security
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
Pretty good privacy - Email Security
Pretty good privacy - Email SecurityPretty good privacy - Email Security
Pretty good privacy - Email Security
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
 
Network security
Network securityNetwork security
Network security
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Viewers also liked

Luxpresentation4workshopparticipants
Luxpresentation4workshopparticipantsLuxpresentation4workshopparticipants
Luxpresentation4workshopparticipantsTom De Schryver
 
20081127001
2008112700120081127001
20081127001jbadenes
 
20081201001
2008120100120081201001
20081201001jbadenes
 
Small Fryz Logo
Small Fryz LogoSmall Fryz Logo
Small Fryz Logorandylim
 
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de LewisTeoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de LewisJesús Flores
 
20081121001
2008112100120081121001
20081121001jbadenes
 
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?ungian iunn
 
20081223003
2008122300320081223003
20081223003jbadenes
 
Auditive Architecture
Auditive ArchitectureAuditive Architecture
Auditive Architectureernstkabel
 
20081210001
2008121000120081210001
20081210001jbadenes
 
20081220001
2008122000120081220001
20081220001jbadenes
 
Los Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De LaLos Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De LaJorge Vera
 
20080830001
2008083000120080830001
20080830001jbadenes
 
ACT Theatre Invite
ACT Theatre InviteACT Theatre Invite
ACT Theatre Inviterandylim
 

Viewers also liked (20)

Luxpresentation4workshopparticipants
Luxpresentation4workshopparticipantsLuxpresentation4workshopparticipants
Luxpresentation4workshopparticipants
 
20081127001
2008112700120081127001
20081127001
 
Pp6
Pp6Pp6
Pp6
 
20081201001
2008120100120081201001
20081201001
 
Cleopatra Stratan 2
Cleopatra Stratan 2Cleopatra Stratan 2
Cleopatra Stratan 2
 
Small Fryz Logo
Small Fryz LogoSmall Fryz Logo
Small Fryz Logo
 
La9.2 Bratcher B
La9.2 Bratcher BLa9.2 Bratcher B
La9.2 Bratcher B
 
7.1.1twistedpair
7.1.1twistedpair7.1.1twistedpair
7.1.1twistedpair
 
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de LewisTeoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
 
20081121001
2008112100120081121001
20081121001
 
Lodi
LodiLodi
Lodi
 
менск минск
менск   минскменск   минск
менск минск
 
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
 
20081223003
2008122300320081223003
20081223003
 
Auditive Architecture
Auditive ArchitectureAuditive Architecture
Auditive Architecture
 
20081210001
2008121000120081210001
20081210001
 
20081220001
2008122000120081220001
20081220001
 
Los Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De LaLos Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De La
 
20080830001
2008083000120080830001
20080830001
 
ACT Theatre Invite
ACT Theatre InviteACT Theatre Invite
ACT Theatre Invite
 

Similar to Security F

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slidetykl94
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20eyad alaa
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementStuart Marsh
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 

Similar to Security F (20)

Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Week13
Week13Week13
Week13
 
Gps4b
Gps4bGps4b
Gps4b
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slide
 
Gps4b
Gps4bGps4b
Gps4b
 
Gps4
Gps4Gps4
Gps4
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Group3
Group3Group3
Group3
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
presenw13
presenw13presenw13
presenw13
 
Homework4
Homework4Homework4
Homework4
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Security F

  • 1. How Encryption for Strong Security Work Member: s1160138 Wataru Tamura s1160139 Ryo Tayama s1160140 Kiyoto Tanji s1160142 Satoshi Tsuchida
  • 2. Networks use encryption for strong security Data encryption ● File encryption ● Link encryption ●
  • 3. Data encryption A data encryption ● program uses a string of numbers called a key. A key create a stream ● of data combining the real information with a pseudorandom stream of bits.
  • 4. File encryption File encryption protects files in central servers ● and mass-storage devices from being read or changed without an encryption key. Local file encryption also protects data from ● physical instruction.
  • 5. Link encryption The PC's encrypted ● data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Routers can use ● encryption between themselves to protect the entire stream of data.
  • 6. Reference http://www.softdesignz.com/nav/images/secretkey.gif ● http://mkpe.com/digital_cinema/images/phase_2_sm.gif ●