SlideShare a Scribd company logo
1 of 6
Download to read offline
Introduction of the Encryption
●   We have a lot of information that we don't want
    other users to see. For example the following
    things.
●   Credit card information
●   Private correspondence
●   Personal details data
●   Bank account information
●   Etc.
Encryption Systems to security



Encryption has been a long time in various ways.
    Encryption is used especially for military
  purposes. Encryption has been created by
  combining the number and text. Today, the
  encryption more well known as algorithms.
Symmetric key encryption


 Symmetric key encryption is thing
that encrypt and decrypt the same
to use the key cryptography. Each
   computer has a secret key in
     symmetric key encryption
Public key cryptosystem



Public key encryption is a method to
   expose the encryption key for
 encrypted using separate keys for
     encryption and decryption.
TLS(Transport Layer Security)

    Transport Layer Security is a
  protocol that required security for
 communication. This protocol often
   has called SSL(Secure Sockets
     Layer frequently).The SSL
    encryption provides the ability
authentication and tamper detection.
Hash function


   The key of public key encryption is based on a
 hash value. It is a value that is computed from a
base input number using a hashing function. Hash
functions are incorporated into the hash algorithm.
   Hash function is used to detect tampering and
  processing speed of the search speed and data
                    comparison.

More Related Content

What's hot

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
Prabhat Goel
 
How encryption works
How encryption worksHow encryption works
How encryption works
aizu_u-11911
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 

What's hot (19)

Sw2
Sw2Sw2
Sw2
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption
EncryptionEncryption
Encryption
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 

Viewers also liked

Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
s1190088
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
s1190088
 
Sw D prezen1pdf
Sw D prezen1pdfSw D prezen1pdf
Sw D prezen1pdf
s1190088
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
s1190088
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
s1190088
 
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
hamahama 34
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
s1190088
 
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Anthony Deydier
 

Viewers also liked (18)

Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
Pag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi BehrPag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi Behr
 
Sw D prezen1pdf
Sw D prezen1pdfSw D prezen1pdf
Sw D prezen1pdf
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sepsis powerpoints
Sepsis powerpointsSepsis powerpoints
Sepsis powerpoints
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
150417 arc flash data center
150417 arc flash data center150417 arc flash data center
150417 arc flash data center
 
Critical care class
Critical care classCritical care class
Critical care class
 
Volunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyVolunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And Philanthropy
 
Introduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesIntroduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for institues
 
iso 22000
 iso 22000 iso 22000
iso 22000
 
Susiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.doc
 
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013
 
Heavy Equipments
Heavy EquipmentsHeavy Equipments
Heavy Equipments
 

Similar to Sw prezen3pdf

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
10 system.security.cryptography
10 system.security.cryptography10 system.security.cryptography
10 system.security.cryptography
Mohammad Alyan
 

Similar to Sw prezen3pdf (20)

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptx
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
10 system.security.cryptography
10 system.security.cryptography10 system.security.cryptography
10 system.security.cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Sw prezen3pdf

  • 1. Introduction of the Encryption ● We have a lot of information that we don't want other users to see. For example the following things. ● Credit card information ● Private correspondence ● Personal details data ● Bank account information ● Etc.
  • 2. Encryption Systems to security Encryption has been a long time in various ways. Encryption is used especially for military purposes. Encryption has been created by combining the number and text. Today, the encryption more well known as algorithms.
  • 3. Symmetric key encryption Symmetric key encryption is thing that encrypt and decrypt the same to use the key cryptography. Each computer has a secret key in symmetric key encryption
  • 4. Public key cryptosystem Public key encryption is a method to expose the encryption key for encrypted using separate keys for encryption and decryption.
  • 5. TLS(Transport Layer Security) Transport Layer Security is a protocol that required security for communication. This protocol often has called SSL(Secure Sockets Layer frequently).The SSL encryption provides the ability authentication and tamper detection.
  • 6. Hash function The key of public key encryption is based on a hash value. It is a value that is computed from a base input number using a hashing function. Hash functions are incorporated into the hash algorithm. Hash function is used to detect tampering and processing speed of the search speed and data comparison.