Upcoming SlideShare
×

# Encriptacion

325 views

Published on

Published in: Technology
0 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• Be the first to comment

• Be the first to like this

Views
Total views
325
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
5
0
Likes
0
Embeds 0
No embeds

No notes for slide

### Encriptacion

1. 1. Cryptography and
2. 2. What is the cryptography? <ul><li>The cryptography is the science of using the mathematics to encrypt and desencriptar information. As soon as the information has been encrypted, it can be stored in a way insecure or sent across an insecure network (as Internet) and nonetheless to remain secret. Then, the information can desencriptarse to his original format. </li></ul>
3. 3. What is the process of encriptación and desencriptación? <ul><li>The encriptación is the process in which the information to protecting is translated into something that seems to be random and that does not have any meaning (the encrypted or ciphered information). The desencriptación is the process into which the encrypted information is converted again to his original form. </li></ul>
4. 4. What is a cryptographic algorithm? <ul><li>A cryptographic algorithm, or person who writes in cipher, is a mathematical function used in the processes of encriptación and desencriptación. A cryptographic algorithm is employed at combination with a key (a number, word, phrase, or password) to encrypt and desencriptar information.
5. 5. To encrypt, the algorithm combines mathematically the information to protecting with a provided key. </li></ul>
6. 6. <ul><li>The result of this calculation it is the encrypted information. For desencriptar, the algorithm does a calculation combining the information encrypted with a provided key, being the result of this combination the information desencriptados. If the key or the information are modified the algorithm it produces a different result. </li></ul>
7. 7. What differences are between the symmetrical algorithms and the asymmetric ones? <ul><li>The symmetrical algorithms encrypt and desencriptan with the same key. The principal advantages of the symmetrical algorithms are his safety and his speed. </li></ul>
8. 8. <ul><li>The asymmetric algorithms encrypt and desencriptan with different keys. The information is encrypted by a public key and desencriptan by a private road, being this one his principal advantage. The asymmetric algorithms, also known as algorithms of public key, need at least a key of 3.000 bits to reach a level of similar safety to of the symmetrical one of 128 bits. And they are incredibly slow, so much that cannot be used to encrypt big quantities of information. </li></ul>