SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption Works

 Online a lot of our time, you must send information and
   our own people - if we use the Internet, we blog and
 news articles such passively clicking around just always
read it, do not bear the information. It does this whether
some other online vendor or CD, order something on the
Internet, when you sign up for an account or online, you
     must enter appropriate transactions for personal
   information confidential. Our name as well as typical
  transaction, as well as the physical address and phone
     number and e-mail address, password or personal
       identification number (PIN) may be included.
Security Encryption Systems
• Computer encryption is based on the science
  of cryptography, which has been used as long
  as humans have wanted to keep information
  secret. Before the digital age, the biggest users
  of cryptography were governments,
  particularly for military purposes.
Symmetric Key
• In symmetric-key encryption, each computer has
  a secret key (code) that it can use to encrypt a
  packet of information before it is sent over the
  network to another computer. Symmetric-key
  requires that you know which computers will be
  talking to each other so you can install the key on
  each one. Symmetric-key encryption is essentially
  the same as a secret code that each of the two
  computers must know in order to decode the
  information. The code provides the key to
  decoding the message.
Public Key Encryption
• One of the weaknesses some point out about
  symmetric key encryption is that two users
  attempting to communicate with each other
  need a secure way to do so; otherwise, an
  attacker can easily pluck the necessary data
  from the stream. In November 1976, a paper
  published in the journal IEEE Transactions on
  Information Theory, titled "New Directions in
  Cryptography," addressed this problem and
  offered up a solution: public-key encryption.
SSL and TLS
• A popular implementation of public-key
  encryption is the Secure Sockets Layer (SSL).
  Originally developed by Netscape, SSL is an
  Internet security protocol used by Internet
  browsers and Web servers to transmit
  sensitive information. SSL has become part of
  an overall security protocol known as
  Transport Layer Security (TLS).
Hashing Algorithm
• The key in public-key encryption is based on a
  hash value. This is a value that is computed
  from a base input number using a hashing
  algorithm. Essentially, the hash value is a
  summary of the original value. The important
  thing about a hash value is that it is nearly
  impossible to derive the original input number
  without knowing the data used to create the
  hash value.

More Related Content

What's hot (10)

Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Eng12
Eng12Eng12
Eng12
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Encryption
EncryptionEncryption
Encryption
 
s117
s117s117
s117
 
How encryption work
How encryption workHow encryption work
How encryption work
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Ss
SsSs
Ss
 

Viewers also liked

Kodi i etikes_ne_turizem_603_1
Kodi i etikes_ne_turizem_603_1Kodi i etikes_ne_turizem_603_1
Kodi i etikes_ne_turizem_603_1Veton Pacolli
 
Red Oscars Decembrie 2011 by Red Point Romania
Red Oscars Decembrie 2011 by Red Point RomaniaRed Oscars Decembrie 2011 by Red Point Romania
Red Oscars Decembrie 2011 by Red Point Romaniaredpointsoftware
 
Red Point Software Solution - Prezentare 2012
Red Point Software Solution - Prezentare 2012Red Point Software Solution - Prezentare 2012
Red Point Software Solution - Prezentare 2012redpointsoftware
 
Sw3 7 12 kadai
Sw3 7 12 kadaiSw3 7 12 kadai
Sw3 7 12 kadainekomaru09
 
Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada
Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada
Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada Janice Dixon
 
Hybrid Smart phone application development analysis
Hybrid Smart phone application development analysisHybrid Smart phone application development analysis
Hybrid Smart phone application development analysisSandeep Krishna
 
Penyakit pada usia lanjut home care - unimus - ika syamsul huda mz - 02 des...
Penyakit pada usia lanjut   home care - unimus - ika syamsul huda mz - 02 des...Penyakit pada usia lanjut   home care - unimus - ika syamsul huda mz - 02 des...
Penyakit pada usia lanjut home care - unimus - ika syamsul huda mz - 02 des...Annisah H
 

Viewers also liked (17)

Bte
BteBte
Bte
 
Body parts
Body partsBody parts
Body parts
 
Body parts
Body partsBody parts
Body parts
 
Kodi i etikes_ne_turizem_603_1
Kodi i etikes_ne_turizem_603_1Kodi i etikes_ne_turizem_603_1
Kodi i etikes_ne_turizem_603_1
 
Dada frenzy Kolkata
Dada frenzy KolkataDada frenzy Kolkata
Dada frenzy Kolkata
 
Red Oscars Decembrie 2011 by Red Point Romania
Red Oscars Decembrie 2011 by Red Point RomaniaRed Oscars Decembrie 2011 by Red Point Romania
Red Oscars Decembrie 2011 by Red Point Romania
 
Red Point Software Solution - Prezentare 2012
Red Point Software Solution - Prezentare 2012Red Point Software Solution - Prezentare 2012
Red Point Software Solution - Prezentare 2012
 
The wiki’s
The wiki’sThe wiki’s
The wiki’s
 
Sw3 7 12 kadai
Sw3 7 12 kadaiSw3 7 12 kadai
Sw3 7 12 kadai
 
Actions
ActionsActions
Actions
 
Alzaimer
AlzaimerAlzaimer
Alzaimer
 
Pendidikan di msia
Pendidikan di msiaPendidikan di msia
Pendidikan di msia
 
Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada
Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada
Get ready for Holiday Giving with The Original Basket Boutique, Calgary, Canada
 
Hybrid Smart phone application development analysis
Hybrid Smart phone application development analysisHybrid Smart phone application development analysis
Hybrid Smart phone application development analysis
 
Describing people
Describing peopleDescribing people
Describing people
 
Penyakit pada usia lanjut home care - unimus - ika syamsul huda mz - 02 des...
Penyakit pada usia lanjut   home care - unimus - ika syamsul huda mz - 02 des...Penyakit pada usia lanjut   home care - unimus - ika syamsul huda mz - 02 des...
Penyakit pada usia lanjut home care - unimus - ika syamsul huda mz - 02 des...
 
Sw2 work
Sw2 workSw2 work
Sw2 work
 

Similar to How Encryption Works Explained

Similar to How Encryption Works Explained (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Encryption
EncryptionEncryption
Encryption
 
encryption
encryptionencryption
encryption
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Ss
SsSs
Ss
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

How Encryption Works Explained

  • 1. How Encryption Works Online a lot of our time, you must send information and our own people - if we use the Internet, we blog and news articles such passively clicking around just always read it, do not bear the information. It does this whether some other online vendor or CD, order something on the Internet, when you sign up for an account or online, you must enter appropriate transactions for personal information confidential. Our name as well as typical transaction, as well as the physical address and phone number and e-mail address, password or personal identification number (PIN) may be included.
  • 2. Security Encryption Systems • Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes.
  • 3. Symmetric Key • In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. Public Key Encryption • One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. In November 1976, a paper published in the journal IEEE Transactions on Information Theory, titled "New Directions in Cryptography," addressed this problem and offered up a solution: public-key encryption.
  • 5. SSL and TLS • A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 6. Hashing Algorithm • The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.