SlideShare a Scribd company logo
1 of 6
Download to read offline
The Internet became indispensable to our
life. We do shopping on a net with a credit
card. We do the transfer to the bank account
on a net. Those information does not want to
be known. Therefore we save it to mediums
such as the flash memory. the most popular
forms of security all rely on encryption, the
process of encoding information in such a
way that only the person with the key can
decode it.
Computer encryption is based on the
science of cryptography, which has been used
as long as humans have wanted to keep
information secret. For example the Greek
made a code with a specific cord including the
substitution of the letter and number or the
transposition. Most forms of cryptography in
use these days rely on computers, simply
because a human-based code is too easy for a
computer to crack.
A key, on the other hand, helps a person or
computer figure out the one possibility on a
given occasion. Computers using symmetric-
key encryption to send information between
each other must have the same key.
Symmetric-key encryption is essentially the
same as a secret code that each of the two
computers must know in order to decode the
information. The code provides the key to
decoding the message.
known as asymmetric-key encryption,
public-key encryption uses two different keys
at once -- a combination of a private key and a
public key. The sending computer encrypts the
document with a symmetric key, then encrypts
the symmetric key with the public key of the
receiving computer. The receiving computer
uses its private key to decode the symmetric
key. It then uses the symmetric key to decode
the document.
The key to public key encryption is based
on hash value. This is value calculated from a
base input number using algorithm performing
a hash. The hash value is a summary of the first
value basically. The important thing about the
hash value is that it is almost impossible to
draw an original input number without knowing
the data which are used to make hash value.
A popular implementation of public-key
encryption is the Secure Sockets Layer (SSL).
Originally developed by Netscape, SSL is an
Internet security protocol used by Internet
browsers and Web servers to transmit sensitive
information. SSL has become part of an overall
security protocol known as Transport Layer
Security (TLS).

More Related Content

What's hot

Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3S1715
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12s1190091
 

What's hot (6)

Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Sw2
Sw2Sw2
Sw2
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Homework1
Homework1Homework1
Homework1
 

Viewers also liked

S&W week11
S&W week11S&W week11
S&W week11s1190100
 
コミュニケーション能力を高めようヒッチハイク旅のススメ
コミュニケーション能力を高めようヒッチハイク旅のススメコミュニケーション能力を高めようヒッチハイク旅のススメ
コミュニケーション能力を高めようヒッチハイク旅のススメSosuke Eguchi
 
How parents can get their yes i ds
How parents can get their yes i dsHow parents can get their yes i ds
How parents can get their yes i dsIjan Nazri
 
Global negotiations doha2012p4_associations
Global negotiations doha2012p4_associationsGlobal negotiations doha2012p4_associations
Global negotiations doha2012p4_associationsArthur Lee
 
Craigslist
CraigslistCraigslist
Craigslists1190100
 
Word camp tokyo2014 わぷーステージ振り返り
Word camp tokyo2014 わぷーステージ振り返りWord camp tokyo2014 わぷーステージ振り返り
Word camp tokyo2014 わぷーステージ振り返りSosuke Eguchi
 
S&W week10
S&W week10S&W week10
S&W week10s1190100
 
Business email
Business emailBusiness email
Business emails1190100
 
DJ KZII - PROFILE
DJ KZII - PROFILEDJ KZII - PROFILE
DJ KZII - PROFILEDJKZII.COM
 
Introduction to how fiber optics work
Introduction to how fiber optics workIntroduction to how fiber optics work
Introduction to how fiber optics works1190100
 
Wct2014 「これからの情報発信セッション」
Wct2014 「これからの情報発信セッション」Wct2014 「これからの情報発信セッション」
Wct2014 「これからの情報発信セッション」Sosuke Eguchi
 
僕がエージェントになって見た世界
僕がエージェントになって見た世界僕がエージェントになって見た世界
僕がエージェントになって見た世界Sosuke Eguchi
 

Viewers also liked (15)

S&W week11
S&W week11S&W week11
S&W week11
 
Td1 pg2-corrige
Td1 pg2-corrigeTd1 pg2-corrige
Td1 pg2-corrige
 
コミュニケーション能力を高めようヒッチハイク旅のススメ
コミュニケーション能力を高めようヒッチハイク旅のススメコミュニケーション能力を高めようヒッチハイク旅のススメ
コミュニケーション能力を高めようヒッチハイク旅のススメ
 
How parents can get their yes i ds
How parents can get their yes i dsHow parents can get their yes i ds
How parents can get their yes i ds
 
Global negotiations doha2012p4_associations
Global negotiations doha2012p4_associationsGlobal negotiations doha2012p4_associations
Global negotiations doha2012p4_associations
 
Craigslist
CraigslistCraigslist
Craigslist
 
Word camp tokyo2014 わぷーステージ振り返り
Word camp tokyo2014 わぷーステージ振り返りWord camp tokyo2014 わぷーステージ振り返り
Word camp tokyo2014 わぷーステージ振り返り
 
S&W week10
S&W week10S&W week10
S&W week10
 
4c90e07b8f4ad4ceb5ba1f56f8b4a276
4c90e07b8f4ad4ceb5ba1f56f8b4a2764c90e07b8f4ad4ceb5ba1f56f8b4a276
4c90e07b8f4ad4ceb5ba1f56f8b4a276
 
Business email
Business emailBusiness email
Business email
 
DJ KZII - PROFILE
DJ KZII - PROFILEDJ KZII - PROFILE
DJ KZII - PROFILE
 
Introduction to how fiber optics work
Introduction to how fiber optics workIntroduction to how fiber optics work
Introduction to how fiber optics work
 
Wct2014 「これからの情報発信セッション」
Wct2014 「これからの情報発信セッション」Wct2014 「これからの情報発信セッション」
Wct2014 「これからの情報発信セッション」
 
僕がエージェントになって見た世界
僕がエージェントになって見た世界僕がエージェントになって見た世界
僕がエージェントになって見た世界
 
Nouveau document microsoft word
Nouveau document microsoft wordNouveau document microsoft word
Nouveau document microsoft word
 

Similar to Encryption Keeps Data Secure Online

Similar to Encryption Keeps Data Secure Online (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
week 12
week 12week 12
week 12
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Encryption
EncryptionEncryption
Encryption
 
Ss
SsSs
Ss
 

Encryption Keeps Data Secure Online

  • 1. The Internet became indispensable to our life. We do shopping on a net with a credit card. We do the transfer to the bank account on a net. Those information does not want to be known. Therefore we save it to mediums such as the flash memory. the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person with the key can decode it.
  • 2. Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. For example the Greek made a code with a specific cord including the substitution of the letter and number or the transposition. Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack.
  • 3. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion. Computers using symmetric- key encryption to send information between each other must have the same key. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The sending computer encrypts the document with a symmetric key, then encrypts the symmetric key with the public key of the receiving computer. The receiving computer uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document.
  • 5. The key to public key encryption is based on hash value. This is value calculated from a base input number using algorithm performing a hash. The hash value is a summary of the first value basically. The important thing about the hash value is that it is almost impossible to draw an original input number without knowing the data which are used to make hash value.
  • 6. A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).