SlideShare a Scribd company logo
What is encryption ?



A encryption is code for security and when we use a computer
, it is necessary . The code has several form and use .
Security Encryption Systems


Computer's code is based on cryproqraphy . This code was
used for military on purpose . Let introduce following code .
First , the code which uses scytale and write your message
along its length . When someone removed the paper from the
cylinder , he can't read the message . Only person who has a
scytale of similar size can read it . Second , the code which
uses ciplers . This code uses a table which a number
correspond to character .
Symmetric key

A code needs a key to decode the massage which is
coincided . When two person exchange the message
to each other , the message is coincided not to be
read by someone . Only they have a key . For
example , if key is “shift by 2” . Code send the key to
them .
The key called DES was used in the U.S in the 1970's
.DES uses a 56-bit key . DES has 70 quadrillion
combinations . But it was cracked by brute force . So
DES has since been replaced by AES . AES uses a
256-bit key .
Public key encryption



One of the weaknesses point out about symmetric key
encryption is that two users must have same key . In November
1976 , public key encryption was released in the journal IEEE .
This key uses two different keys at once . The private key is
given by your coomputer to any computer . You need private
key and public key to decode message . These key consist of
prime number .
SSL and TLS


A popular implementation of public-key encryption is the
Secure Sockets Layer (SSL) . SSL is an Internet security
protocol used by Internet browsers . TLS is a secure protocol .
You can see that the “http” in the address line is replaced with
“https” when you are accessing sensitive information , such as
an online bank You will know your information will most likely
pass along securely .
Hashing Algorithm


The key in public-key encryption is based on a hash
value , Hash value 's feature is that it is nearly
impossible to derive the original number without
knowing the data used to create the hash value
.Hashing algorithm can create very large hash value
including 40-bit or even 128-bit numbers .

More Related Content

What's hot

How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
rajakhurram
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
yu
 

What's hot (20)

Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 
Asymmetric key
Asymmetric key Asymmetric key
Asymmetric key
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Encryption
EncryptionEncryption
Encryption
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Lecture3a symmetric encryption
Lecture3a symmetric encryptionLecture3a symmetric encryption
Lecture3a symmetric encryption
 
Evolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyEvolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptography
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Encryption
EncryptionEncryption
Encryption
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
 
Asif
AsifAsif
Asif
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Encryption
EncryptionEncryption
Encryption
 

Similar to 無題 1 (20)

Encryption
EncryptionEncryption
Encryption
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Week12
Week12Week12
Week12
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Ss
SsSs
Ss
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Data encryption
Data encryptionData encryption
Data encryption
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Sw week12
Sw week12Sw week12
Sw week12
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

More from stella12345 (7)

Unit100
Unit100Unit100
Unit100
 
Unit99
Unit99Unit99
Unit99
 
Unit98
Unit98Unit98
Unit98
 
Sw2
Sw2Sw2
Sw2
 
Sw fire
Sw fireSw fire
Sw fire
 
Sw fire
Sw fireSw fire
Sw fire
 
Sw2 kadai
Sw2 kadaiSw2 kadai
Sw2 kadai
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

無題 1

  • 1. What is encryption ? A encryption is code for security and when we use a computer , it is necessary . The code has several form and use .
  • 2. Security Encryption Systems Computer's code is based on cryproqraphy . This code was used for military on purpose . Let introduce following code . First , the code which uses scytale and write your message along its length . When someone removed the paper from the cylinder , he can't read the message . Only person who has a scytale of similar size can read it . Second , the code which uses ciplers . This code uses a table which a number correspond to character .
  • 3. Symmetric key A code needs a key to decode the massage which is coincided . When two person exchange the message to each other , the message is coincided not to be read by someone . Only they have a key . For example , if key is “shift by 2” . Code send the key to them . The key called DES was used in the U.S in the 1970's .DES uses a 56-bit key . DES has 70 quadrillion combinations . But it was cracked by brute force . So DES has since been replaced by AES . AES uses a 256-bit key .
  • 4. Public key encryption One of the weaknesses point out about symmetric key encryption is that two users must have same key . In November 1976 , public key encryption was released in the journal IEEE . This key uses two different keys at once . The private key is given by your coomputer to any computer . You need private key and public key to decode message . These key consist of prime number .
  • 5. SSL and TLS A popular implementation of public-key encryption is the Secure Sockets Layer (SSL) . SSL is an Internet security protocol used by Internet browsers . TLS is a secure protocol . You can see that the “http” in the address line is replaced with “https” when you are accessing sensitive information , such as an online bank You will know your information will most likely pass along securely .
  • 6. Hashing Algorithm The key in public-key encryption is based on a hash value , Hash value 's feature is that it is nearly impossible to derive the original number without knowing the data used to create the hash value .Hashing algorithm can create very large hash value including 40-bit or even 128-bit numbers .