SlideShare a Scribd company logo
Basic Encryption
Cryptography (from Greek kryptós, "to hide, to
conceal, to obscure", and graphein, "to etch, to
inscribe, to write down") is, traditionally, the
study of means of converting information from
its normal, comprehensible form into an
incomprehensible format, rendering it
unreadable without secret knowledge — the art
of encryption.

The purpose of encryption is to ensure that
only somebody who is authorized to access
data (e.g. a text message or a file), will be
able to read it, using the decryption key.

Somebody who is not authorized can be
excluded, because he or she does not have
the required key, without which it is
impossible to read the encrypted information.

Using a key to determine it's behavior, a
cipher changes raw data into encrypted data,
hiding it's original content.

The data is then transmitted over some
medium (ex. The Internet)

The data reaches it's recipient, who uses the
same key as the sender to run the cipher,
which turns the data back to it's original form.
Early Encryption

The earliest form of encryption was simple
writing.

In very early times the number of people who
were literate (able to read) was so limited,
simply writing your message down was semi-
effective encryption

As a higher percentage of the population
became literate, more effective methods to
disguise a message's contents were
needed.
Early Encryption Cont.

Nearly all civilizations that possessed a written
language created some form of encryption

The early Greeks used a cylinder of a specific
circumference which, when a strip of paper was
wound around it, arranged the letters into a
readable form

The “Caesar” cipher was supposedly used by
Julius Caesar to communicate with his generals

In this simple scheme, every letter would be replaced
with the letter 3 places down in the alphabet

D replacing A, E replacing B, etc etc.

In India, the 2,000 year old Kamasutra lists two
different methods of encryption

One method replaces vowels with consonants,
and the other replaces one letter with another

All these methods were rendered breakable
through frequency analysis

Using math to compare how frequently a
encrypted letter is used, vs how frequently a
letter is used in the alphabet.

This requires knowing the language patterns of
the message's language.
Example of modern encryption

Let's take an ATM pin for example. You
wouldn't want your pin broadcast from the
ATM, through the internet, to your bank to
verify that you can pull money from an ATM,
unencrypted, open for everyone to see.

Encryption solves this issue.

Your pin would be turned into binary digits, for
example a 4 bit segment.
− Pin is 1234

1 is 0001

2 is 0010

3 is 0011

4 is 0100
− Pin in binary is

0001001000110100

Using the key (instructions for the cipher to
change digits a certain way), the cipher
makes the Pin unreadable
− In this example the cipher is 1 to 0, 0 to 1.
− 0001001000110100 (Pin in readable binary)
is entered into the cipher.
− The pin is entered into the cipher
− Cipher generates 1110110111001011 as the
encrypted Pin.

In this example all the cipher did was change
1s to 0s and 0s to 1s. But real ciphers are
very complex algorithms.

Encrypted Pin is transmitted from the ATM to
the bank via unsecured internet
Pin arrives at the bank, who then applies the
same key (ABCD) to run the cipher and turn
the encrypted Pin, 1110110111001011, back
into the unencrypted, readable Pin
0001001000110100 (1234 in binary)

Bank checks the Pin against the customer's
profile, and allows the customer to access
their money.

All of this happens very fast

Most customers are completely unaware of
what happened behind the scenes to make
sure that no one could steal their Pin number
while it traveled to the bank's servers.

More Related Content

What's hot

Data Encryption
Data EncryptionData Encryption
Data Encryption
Nitin Parbhakar
 
Network Security
Network SecurityNetwork Security
Network Security
Ritam Das
 
Network security notes
Network security notesNetwork security notes
Network security notes
netlabacademy
 
Week12
Week12Week12
Week12
s1180004
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 
Electronic Payment Systems
Electronic Payment SystemsElectronic Payment Systems
Electronic Payment Systems
itsvineeth209
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
Muhammadalizardari
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
AdityaShukla141
 
My cryptography
My cryptographyMy cryptography
My cryptography
NAVYA RAO
 
Cryptography
CryptographyCryptography
Cryptography
Shray Jali
 
Password protection
Password protection Password protection
Password protection
JamaicaLeslieNoveno
 
Cryptography
CryptographyCryptography
Cryptography
Sandip kumar
 
Cryptography
CryptographyCryptography
Cryptography
Vishalya Dulam
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
hey4ndr3w
 
Cryptography
CryptographyCryptography
Cryptography
Suraj Shukla
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Cryptography
CryptographyCryptography
Cryptography
prasham95
 

What's hot (19)

Data Encryption
Data EncryptionData Encryption
Data Encryption
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security notes
Network security notesNetwork security notes
Network security notes
 
Week12
Week12Week12
Week12
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Electronic Payment Systems
Electronic Payment SystemsElectronic Payment Systems
Electronic Payment Systems
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Password protection
Password protection Password protection
Password protection
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Basic encryption

cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
vimalguptaofficial
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
Harrisentertainment
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
CyberGhost VPN
 
Crypt
CryptCrypt
Crypt
Mir Majid
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
HamnaMalik31
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
Aditya Raina
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
Faraz Qureshi
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
Mona Rajput
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
cryptography
cryptographycryptography
cryptography
Abhijeet Singh
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Crypto
CryptoCrypto
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
desalewminale
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Petar Radanliev
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Technical Hub
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCL
jrice8
 

Similar to Basic encryption (20)

cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Crypt
CryptCrypt
Crypt
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Ccn presentation
Ccn presentationCcn presentation
Ccn presentation
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Crypto
CryptoCrypto
Crypto
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography Intro - NCL
Cryptography Intro - NCLCryptography Intro - NCL
Cryptography Intro - NCL
 

Recently uploaded

06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 

Recently uploaded (20)

06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 

Basic encryption

  • 1. Basic Encryption Cryptography (from Greek kryptós, "to hide, to conceal, to obscure", and graphein, "to etch, to inscribe, to write down") is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge — the art of encryption.
  • 2.  The purpose of encryption is to ensure that only somebody who is authorized to access data (e.g. a text message or a file), will be able to read it, using the decryption key.  Somebody who is not authorized can be excluded, because he or she does not have the required key, without which it is impossible to read the encrypted information.
  • 3.  Using a key to determine it's behavior, a cipher changes raw data into encrypted data, hiding it's original content.  The data is then transmitted over some medium (ex. The Internet)  The data reaches it's recipient, who uses the same key as the sender to run the cipher, which turns the data back to it's original form.
  • 4. Early Encryption  The earliest form of encryption was simple writing.  In very early times the number of people who were literate (able to read) was so limited, simply writing your message down was semi- effective encryption  As a higher percentage of the population became literate, more effective methods to disguise a message's contents were needed.
  • 5. Early Encryption Cont.  Nearly all civilizations that possessed a written language created some form of encryption  The early Greeks used a cylinder of a specific circumference which, when a strip of paper was wound around it, arranged the letters into a readable form  The “Caesar” cipher was supposedly used by Julius Caesar to communicate with his generals  In this simple scheme, every letter would be replaced with the letter 3 places down in the alphabet  D replacing A, E replacing B, etc etc.
  • 6.  In India, the 2,000 year old Kamasutra lists two different methods of encryption  One method replaces vowels with consonants, and the other replaces one letter with another  All these methods were rendered breakable through frequency analysis  Using math to compare how frequently a encrypted letter is used, vs how frequently a letter is used in the alphabet.  This requires knowing the language patterns of the message's language.
  • 7. Example of modern encryption  Let's take an ATM pin for example. You wouldn't want your pin broadcast from the ATM, through the internet, to your bank to verify that you can pull money from an ATM, unencrypted, open for everyone to see.  Encryption solves this issue.
  • 8.  Your pin would be turned into binary digits, for example a 4 bit segment. − Pin is 1234  1 is 0001  2 is 0010  3 is 0011  4 is 0100 − Pin in binary is  0001001000110100
  • 9.  Using the key (instructions for the cipher to change digits a certain way), the cipher makes the Pin unreadable − In this example the cipher is 1 to 0, 0 to 1. − 0001001000110100 (Pin in readable binary) is entered into the cipher. − The pin is entered into the cipher − Cipher generates 1110110111001011 as the encrypted Pin.  In this example all the cipher did was change 1s to 0s and 0s to 1s. But real ciphers are very complex algorithms.
  • 10.  Encrypted Pin is transmitted from the ATM to the bank via unsecured internet Pin arrives at the bank, who then applies the same key (ABCD) to run the cipher and turn the encrypted Pin, 1110110111001011, back into the unencrypted, readable Pin 0001001000110100 (1234 in binary)  Bank checks the Pin against the customer's profile, and allows the customer to access their money.
  • 11.  All of this happens very fast  Most customers are completely unaware of what happened behind the scenes to make sure that no one could steal their Pin number while it traveled to the bank's servers.