SlideShare a Scribd company logo
1 of 6
Download to read offline
Introduction of the Encryption
●   We have a lot of information that we don't want
    other users to see. For example the following
    things.
●   Credit card information
●   Private correspondence
●   Personal details data
●   Bank account information
●   Etc.
Encryption Systems to security



Encryption has been a long time in various ways.
    Encryption is used especially for military
  purposes. Encryption has been created by
  combining the number and text. Today, the
  encryption more well known as algorithms.
Symmetric key encryption


 Symmetric key encryption is thing
that encrypt and decrypt the same
to use the key cryptography. Each
   computer has a secret key in
     symmetric key encryption
Public key encryption



Public key encryption is a method to
   expose the encryption key for
 encrypted using separate keys for
     encryption and decryption.
TLS(Transport Layer Security)

    Transport Layer Security is a
  protocol that required security for
 communication. This protocol often
   has called SSL(Secure Sockets
     Layer frequently).The SSL
    encryption provides the ability
authentication and tamper detection.
Hash function


   The key of public key encryption is based on a
 hash value. It is a value that is computed from a
base input number using a hashing function. Hash
functions are incorporated into the hash algorithm.
   Hash function is used to detect tampering and
  processing speed of the search speed and data
                    comparison.

More Related Content

What's hot

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Worksray0510711s
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingCheapSSLsecurity
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
 
Data encryption
Data encryptionData encryption
Data encryptionAman Jain
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyGayathridevi120
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3S1715
 

What's hot (17)

Sw2
Sw2Sw2
Sw2
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption
EncryptionEncryption
Encryption
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Week12
Week12Week12
Week12
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Encryption
Encryption Encryption
Encryption
 

Viewers also liked

Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdfs1190088
 
150417 arc flash data center
150417 arc flash data center150417 arc flash data center
150417 arc flash data centergarygohcs
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdfs1190088
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Sw D prezen1pdf
Sw D prezen1pdfSw D prezen1pdf
Sw D prezen1pdfs1190088
 
Pag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi BehrPag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi Behrheidibehr2011
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdfs1190088
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdfs1190088
 
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)hamahama 34
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Volunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyVolunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyMastura Mohd Rashid
 
Introduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesIntroduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesMangesh Wagh
 
Susiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusie Brishaber
 
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Anthony Deydier
 

Viewers also liked (18)

Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
150417 arc flash data center
150417 arc flash data center150417 arc flash data center
150417 arc flash data center
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Sepsis powerpoints
Sepsis powerpointsSepsis powerpoints
Sepsis powerpoints
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw D prezen1pdf
Sw D prezen1pdfSw D prezen1pdf
Sw D prezen1pdf
 
Pag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi BehrPag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi Behr
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Critical care class
Critical care classCritical care class
Critical care class
 
Volunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyVolunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And Philanthropy
 
Introduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesIntroduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for institues
 
iso 22000
 iso 22000 iso 22000
iso 22000
 
Susiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.doc
 
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013
 
Heavy Equipments
Heavy EquipmentsHeavy Equipments
Heavy Equipments
 

Similar to Sw2 prezen3pdf

Similar to Sw2 prezen3pdf (20)

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptx
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
10 system.security.cryptography
10 system.security.cryptography10 system.security.cryptography
10 system.security.cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Sw2 prezen3pdf

  • 1. Introduction of the Encryption ● We have a lot of information that we don't want other users to see. For example the following things. ● Credit card information ● Private correspondence ● Personal details data ● Bank account information ● Etc.
  • 2. Encryption Systems to security Encryption has been a long time in various ways. Encryption is used especially for military purposes. Encryption has been created by combining the number and text. Today, the encryption more well known as algorithms.
  • 3. Symmetric key encryption Symmetric key encryption is thing that encrypt and decrypt the same to use the key cryptography. Each computer has a secret key in symmetric key encryption
  • 4. Public key encryption Public key encryption is a method to expose the encryption key for encrypted using separate keys for encryption and decryption.
  • 5. TLS(Transport Layer Security) Transport Layer Security is a protocol that required security for communication. This protocol often has called SSL(Secure Sockets Layer frequently).The SSL encryption provides the ability authentication and tamper detection.
  • 6. Hash function The key of public key encryption is based on a hash value. It is a value that is computed from a base input number using a hashing function. Hash functions are incorporated into the hash algorithm. Hash function is used to detect tampering and processing speed of the search speed and data comparison.