1. How Encryption for Strong
Security Works
Web presentation GROUP C
TCP
Encryption key
Numeric key
VPN
How Encryption for Strong Security Works – p.1/6
2. TCP
TCP is one of the protocols used by the
communication processing of TCP/IP.
TCP and UDP are used at protocol of transport
layer.Reliability of TCP is higher though transfer
speed is lower than UDP.
How Encryption for Strong Security Works – p.2/6
3. Key
In cryptography, a key is a piece of information (a
parameter) that determines the functional output of
a cryptographic algorithm or cipher. Without a key,
the algorithm would have no result. In encryption,
a key specifies the particular transformation of plain-
text into ciphertext, or vice versa during decryption.
How Encryption for Strong Security Works – p.3/6
4. Numeric key
Numeric keys are the key groups where the key
that input the figure such as calculators, computers
and signs for the arithmetic operation was arranged.
How Encryption for Strong Security Works – p.4/6
5. VPN
Virtual Private Network is service that can use public
circuit like lease line. It is used for the connection of
the network in enterprise between base etc.
Recently, the connection service between bases of the
data communication is indicated, and service that
connects LAN in the enterprise mutually through the
backbone network of the communication career is
said.
How Encryption for Strong Security Works – p.5/6
6. References
e-Words
•
URL:http://e-words.jp/w/ISDN.html
• Wikipedia
URL:http://ja.wikipedia.org/wiki/
How Encryption for Strong Security Works – p.6/6