How Encryption Works

389 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
389
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

How Encryption Works

  1. 1. How Encryption Works "
  2. 2. Security Encryption Systems   Credit-card information   Social Security numbers   Private correspondence   Personal details   Sensitive company information   Bank-account information
  3. 3. Symmetric Key   Symmetric-key encryption   the Data Encryption Standard (DES)   the Advanced Encryption Standard (AES)
  4. 4. Public Key Encryption   Asymmetric-key   Pretty Good Privacy (PGP)   Digital Certificates   Certificate Authority
  5. 5. SSL and TLS   Secure Sockets Layer   Transport Layer Security
  6. 6. Hashing Algorithm   Hash Value   Algorithms   Sahara Desert Input number Hashing algorithm Hash value 10,667 Input # x 143 1,525,381
  7. 7. Authentication   Password   Pass cards   Digital signatures   Biometrics Fingerprint scan Retina scan Face scan Voice identification
  8. 8. Checksum and CRC   Checksum If the sum of the other bytes in the packet is 255 or less, than the checksum contains that exact value If the sum of the other bytes is more than 255, then the checksum is the remainder of the total value after it has been divided by 256   Cyclic Redundancy Check (CRC)

×