SlideShare a Scribd company logo
How Encryption Works

  When we use the Internet, we're not always just
      clicking around and passively taking in
 information, such as reading news articles or blog
  posts -- a great deal of our time online involves
       sending others our own information.
  A typical transaction might include not only our
 names, e-mail addresses and physical address and
  phone number, but also passwords and personal
           identification numbers (PINs).
Information security is provided on computers and
     over the Internet by a variety of methods.
• Security Encryption Systems
• Computer encryption is based on the science of
  cryptography, which has been used as long as
  humans have wanted to keep information secret.
• As long as both generals had the correct cipher,
  they could decode any message the other sent.
• To make the message more difficult to decipher,
  they could arrange the letters inside the grid in any
  combination.
• Most forms of cryptography in use these days rely
  on computers, simply because a human-based
  code is too easy for a computer to crack.
• Computer encryption systems generally belong
  in one of two categories:
• Symmetric-key encryption
• Public-key encryption
• Symmetric Key
• Just like two Spartan generals sending messages to each
  other, computers using symmetric-key encryption to send
  information between each other must have the same key.

• In symmetric-key encryption, each computer has a secret
  key (code) that it can use to encrypt a packet of
  information before it is sent over the network to another
  computer. Symmetric-key requires that you know which
  computers will be talking to each other so you can install
  the key on each one. Symmetric-key encryption is
  essentially the same as a secret code that each of the two
  computers must know in order to decode the information.
  The code provides the key to decoding the message.
Caesar's Cipher
• Julius Caesar also used a similar substitution technique,
  shifting three letters up. If he wanted to say "CROSSING
  THE RUBICON," for instance, he'd write down "FURVV
  LQJWK HUXEL FRQ" instead. As you can see, the text is
  also broken up into even groups in order to make the size
  of each word less obvious.

• Think of it like this: You create a coded message to send to
  a friend in which each letter is substituted with the letter
  that is two down from it in the alphabet. So "A" becomes
  "C," and "B" becomes "D". You have already told a trusted
  friend that the code is "Shift by 2". Your friend gets the
  message and decodes it. Anyone else who sees the
  message will see only nonsense.
SSL and TLS
• A popular implementation of public-key
  encryption is the Secure Sockets Layer
  (SSL). Originally developed by Netscape,
  SSL is an Internet security protocol used by
  Internet browsers and Web servers to
  transmit sensitive information. SSL has
  become part of an overall security protocol
  known as Transport Layer Security (TLS).
Hashing Algorithm
• The key in public-key encryption is based
  on a hash value. This is a value that is
  computed from a base input number using a
  hashing algorithm. Essentially, the hash
  value is a summary of the original value.
  The important thing about a hash value is
  that it is nearly impossible to derive the
  original input number without knowing the
  data used to create the hash value.
Authentication
• As stated earlier, encryption is the process of
  taking all of the data that one computer is sending
  to another and encoding it into a form that only the
  other computer will be able to decode. Another
  process, authentication, is used to verify that the
  information comes from a trusted source.
  Basically, if information is "authentic," you know
  who created it and you know that it has not been
  altered in any way since that person created it.
  These two processes, encryption and
  authentication, work hand-in-hand to create a
  secure environment.

More Related Content

Viewers also liked

A tribute to Bishop Clemens Thottungal
A tribute to Bishop Clemens ThottungalA tribute to Bishop Clemens Thottungal
A tribute to Bishop Clemens Thottungal
patergiri
 
Williams 2010 W Globaliz Vs Darul Islam As Pubd
Williams 2010 W Globaliz Vs Darul Islam As PubdWilliams 2010 W Globaliz Vs Darul Islam As Pubd
Williams 2010 W Globaliz Vs Darul Islam As Pubd
markswilliams59
 
Wesolekpresentation 1
Wesolekpresentation 1Wesolekpresentation 1
Wesolekpresentation 1
guest52df3b0
 
Politikat tregtare dhe funksionimi i organizates Boterore te Tregetis
Politikat tregtare dhe funksionimi i organizates Boterore te TregetisPolitikat tregtare dhe funksionimi i organizates Boterore te Tregetis
Politikat tregtare dhe funksionimi i organizates Boterore te TregetisMenaxherat
 
Университеты Англии
Университеты АнглииУниверситеты Англии
Университеты АнглииKlukva
 
Seu corpo é o novo computador - Social media week 2014 - Luciano Palma
Seu corpo é o novo computador - Social media week 2014 - Luciano PalmaSeu corpo é o novo computador - Social media week 2014 - Luciano Palma
Seu corpo é o novo computador - Social media week 2014 - Luciano Palma
Luciano Palma
 
مقرر تنظيم السنة الدراسية2012-2011
مقرر تنظيم السنة الدراسية2012-2011مقرر تنظيم السنة الدراسية2012-2011
مقرر تنظيم السنة الدراسية2012-2011
Elhassan ROUIJEL
 
3ª Declinación
3ª Declinación3ª Declinación
3ª Declinación
Ángel Martín
 
Using Rails to Create an Enterprise App: A Real-Life Case Study
Using Rails to Create an Enterprise App: A Real-Life Case StudyUsing Rails to Create an Enterprise App: A Real-Life Case Study
Using Rails to Create an Enterprise App: A Real-Life Case Study
David Keener
 
Vernal Pool Identification and Conservation in Keene, NH
Vernal  Pool Identification and Conservation in Keene, NHVernal  Pool Identification and Conservation in Keene, NH
Vernal Pool Identification and Conservation in Keene, NH
Christopher Brehme
 
Millennial Mom's Eating Habits - Infographic Study
Millennial Mom's Eating Habits - Infographic StudyMillennial Mom's Eating Habits - Infographic Study
Millennial Mom's Eating Habits - Infographic Study
SheSpeaks Inc.
 
玩具拆解 刘扬 107081026
玩具拆解 刘扬 107081026玩具拆解 刘扬 107081026
玩具拆解 刘扬 107081026zust
 
HSA Drama Symbolic Capital
HSA Drama Symbolic CapitalHSA Drama Symbolic Capital
HSA Drama Symbolic CapitalDimitris Tsingos
 
Encuentro 4 Evaluar con tic
Encuentro 4 Evaluar con ticEncuentro 4 Evaluar con tic
Who's talking about your sports book brand today? iGaming Business Super Show...
Who's talking about your sports book brand today? iGaming Business Super Show...Who's talking about your sports book brand today? iGaming Business Super Show...
Who's talking about your sports book brand today? iGaming Business Super Show...
Joakim Nilsson
 
Durf je
Durf jeDurf je
TVARMA_Hardbound_declassified
TVARMA_Hardbound_declassifiedTVARMA_Hardbound_declassified
TVARMA_Hardbound_declassified
Tarun Varma
 
Pik's portfolio2011
Pik's portfolio2011Pik's portfolio2011
Pik's portfolio2011
Pik Lertsavetpong
 

Viewers also liked (20)

A tribute to Bishop Clemens Thottungal
A tribute to Bishop Clemens ThottungalA tribute to Bishop Clemens Thottungal
A tribute to Bishop Clemens Thottungal
 
Williams 2010 W Globaliz Vs Darul Islam As Pubd
Williams 2010 W Globaliz Vs Darul Islam As PubdWilliams 2010 W Globaliz Vs Darul Islam As Pubd
Williams 2010 W Globaliz Vs Darul Islam As Pubd
 
Wesolekpresentation 1
Wesolekpresentation 1Wesolekpresentation 1
Wesolekpresentation 1
 
Politikat tregtare dhe funksionimi i organizates Boterore te Tregetis
Politikat tregtare dhe funksionimi i organizates Boterore te TregetisPolitikat tregtare dhe funksionimi i organizates Boterore te Tregetis
Politikat tregtare dhe funksionimi i organizates Boterore te Tregetis
 
Университеты Англии
Университеты АнглииУниверситеты Англии
Университеты Англии
 
Seu corpo é o novo computador - Social media week 2014 - Luciano Palma
Seu corpo é o novo computador - Social media week 2014 - Luciano PalmaSeu corpo é o novo computador - Social media week 2014 - Luciano Palma
Seu corpo é o novo computador - Social media week 2014 - Luciano Palma
 
مقرر تنظيم السنة الدراسية2012-2011
مقرر تنظيم السنة الدراسية2012-2011مقرر تنظيم السنة الدراسية2012-2011
مقرر تنظيم السنة الدراسية2012-2011
 
FLASH繪圖工具介紹
FLASH繪圖工具介紹FLASH繪圖工具介紹
FLASH繪圖工具介紹
 
3ª Declinación
3ª Declinación3ª Declinación
3ª Declinación
 
Using Rails to Create an Enterprise App: A Real-Life Case Study
Using Rails to Create an Enterprise App: A Real-Life Case StudyUsing Rails to Create an Enterprise App: A Real-Life Case Study
Using Rails to Create an Enterprise App: A Real-Life Case Study
 
Anti
AntiAnti
Anti
 
Vernal Pool Identification and Conservation in Keene, NH
Vernal  Pool Identification and Conservation in Keene, NHVernal  Pool Identification and Conservation in Keene, NH
Vernal Pool Identification and Conservation in Keene, NH
 
Millennial Mom's Eating Habits - Infographic Study
Millennial Mom's Eating Habits - Infographic StudyMillennial Mom's Eating Habits - Infographic Study
Millennial Mom's Eating Habits - Infographic Study
 
玩具拆解 刘扬 107081026
玩具拆解 刘扬 107081026玩具拆解 刘扬 107081026
玩具拆解 刘扬 107081026
 
HSA Drama Symbolic Capital
HSA Drama Symbolic CapitalHSA Drama Symbolic Capital
HSA Drama Symbolic Capital
 
Encuentro 4 Evaluar con tic
Encuentro 4 Evaluar con ticEncuentro 4 Evaluar con tic
Encuentro 4 Evaluar con tic
 
Who's talking about your sports book brand today? iGaming Business Super Show...
Who's talking about your sports book brand today? iGaming Business Super Show...Who's talking about your sports book brand today? iGaming Business Super Show...
Who's talking about your sports book brand today? iGaming Business Super Show...
 
Durf je
Durf jeDurf je
Durf je
 
TVARMA_Hardbound_declassified
TVARMA_Hardbound_declassifiedTVARMA_Hardbound_declassified
TVARMA_Hardbound_declassified
 
Pik's portfolio2011
Pik's portfolio2011Pik's portfolio2011
Pik's portfolio2011
 

Similar to Amazon

Ss
SsSs
Week12
Week12Week12
Week12
Ma310Shi
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
Sw2
Sw2Sw2
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
Hideyuki Sato
 
Kadai1
Kadai1Kadai1
Kadai1
s1190105
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 
Cryptography
CryptographyCryptography
Cryptography
Sourabh Badve
 
Week12 b
Week12 bWeek12 b
Week12 b
Takuma Abe
 
week 12
week 12week 12
week 12
s1200008
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Cryptointro
CryptointroCryptointro
Cryptointro
losalamos
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
s1190091
 
Week12
Week12Week12
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 

Similar to Amazon (20)

Ss
SsSs
Ss
 
Week12
Week12Week12
Week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Sw2
Sw2Sw2
Sw2
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Cryptography
CryptographyCryptography
Cryptography
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Kadai1
Kadai1Kadai1
Kadai1
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Cryptography
CryptographyCryptography
Cryptography
 
Week12 b
Week12 bWeek12 b
Week12 b
 
week 12
week 12week 12
week 12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week12
Week12Week12
Week12
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 

More from yuyatamaru

Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazonda
AmazondaAmazonda
Amazonda
yuyatamaru
 
Amazonda
AmazondaAmazonda
Amazonda
yuyatamaru
 
Amazonda
AmazondaAmazonda
Amazonda
yuyatamaru
 
Amazonda
AmazondaAmazonda
Amazonda
yuyatamaru
 
Amazonda
AmazondaAmazonda
Amazonda
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
yuyatamaru
 

More from yuyatamaru (15)

Amazon
AmazonAmazon
Amazon
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Amazon

  • 1. How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs). Information security is provided on computers and over the Internet by a variety of methods.
  • 2. • Security Encryption Systems • Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. • As long as both generals had the correct cipher, they could decode any message the other sent. • To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination. • Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack.
  • 3. • Computer encryption systems generally belong in one of two categories: • Symmetric-key encryption • Public-key encryption
  • 4. • Symmetric Key • Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. • In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. Caesar's Cipher • Julius Caesar also used a similar substitution technique, shifting three letters up. If he wanted to say "CROSSING THE RUBICON," for instance, he'd write down "FURVV LQJWK HUXEL FRQ" instead. As you can see, the text is also broken up into even groups in order to make the size of each word less obvious. • Think of it like this: You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.
  • 6. SSL and TLS • A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 7. Hashing Algorithm • The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.
  • 8. Authentication • As stated earlier, encryption is the process of taking all of the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Another process, authentication, is used to verify that the information comes from a trusted source. Basically, if information is "authentic," you know who created it and you know that it has not been altered in any way since that person created it. These two processes, encryption and authentication, work hand-in-hand to create a secure environment.