SlideShare a Scribd company logo
1 of 6
Download to read offline
Introduction to How Encryption
               Works
When we use the Internet, we're not always just
       clicking around and passively taking in
   information, such as reading news articles or
     blog posts -- a great deal of our time online
   involves sending others our own information.
  Ordering something over the Internet, whether
it's a book, a CD or anything else from an online
    vendor, or signing up for an online account,
    requires entering in a good deal of sensitive
                 personal information.
Security Encryption Systems

The Greek historian Plutarch wrote, for example, about
  Spartan generals who sent and received sensitive
messages using a scytale, a thin cylinder made out of
 wood. The general would wrap a piece of parchment
  around the scytale and write his message along its
 length. When someone removed the paper from the
    cylinder, the writing appeared to be a jumble of
    nonsense. But if the other general receiving the
parchment had a scytale of similar size, he could wrap
   the paper around it and easily read the intended
                        message.
Symmetric Key
 Just like two Spartan generals sending messages to each
 other, computers using symmetric-key encryption to send
 information between each other must have the same key.

 In symmetric-key encryption, each computer has a secret
key (code) that it can use to encrypt a packet of information
   before it is sent over the network to another computer.
Symmetric-key requires that you know which computers will
 be talking to each other so you can install the key on each
one. Symmetric-key encryption is essentially the same as a
 secret code that each of the two computers must know in
order to decode the information. The code provides the key
                  to decoding the message.
Public Key Encryption

  One of the weaknesses some point out about
   symmetric key encryption is that two users
attempting to communicate with each other need
  a secure way to do so; otherwise, an attacker
  can easily pluck the necessary data from the
     stream. Also known as asymmetric-key
   encryption, public-key encryption uses two
   different keys at once -- a combination of a
           private key and a public key.
SSL and TLS

  In your browser, you can tell when you are using a
secure protocol, such as TLS, in a couple of different
ways. You will notice that the "http" in the address line
 is replaced with "https," and you should see a small
padlock in the status bar at the bottom of the browser
window. When you're accessing sensitive information,
such as an online bank account or a payment transfer
service like PayPal or Google Checkout, chances are
 you'll see this type of format change and know your
    information will most likely pass along securely.
Hashing Algorithm

The key in public-key encryption is based on a
 hash value. This is a value that is computed
  from a base input number using a hashing
   algorithm. Essentially, the hash value is a
 summary of the original value. The important
  thing about a hash value is that it is nearly
impossible to derive the original input number
 without knowing the data used to create the
                  hash value.

More Related Content

What's hot

What's hot (6)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Encryption
EncryptionEncryption
Encryption
 
Week12
Week12Week12
Week12
 
s117
s117s117
s117
 
Data encryption
Data encryptionData encryption
Data encryption
 

Viewers also liked

Comparison of my products to existing media products
Comparison of my products to existing media productsComparison of my products to existing media products
Comparison of my products to existing media productsAmna Qaiser
 
Trabajo internet historia
Trabajo internet  historiaTrabajo internet  historia
Trabajo internet historiapupecilla
 
Question 1
Question 1Question 1
Question 1410442
 
Resultados 2 (Vulcanismo)
Resultados 2 (Vulcanismo)Resultados 2 (Vulcanismo)
Resultados 2 (Vulcanismo)Sasuke Sakura
 

Viewers also liked (6)

Comparison of my products to existing media products
Comparison of my products to existing media productsComparison of my products to existing media products
Comparison of my products to existing media products
 
Trabajo internet historia
Trabajo internet  historiaTrabajo internet  historia
Trabajo internet historia
 
Question 1
Question 1Question 1
Question 1
 
Закон Архімеда
Закон АрхімедаЗакон Архімеда
Закон Архімеда
 
White fang
White fangWhite fang
White fang
 
Resultados 2 (Vulcanismo)
Resultados 2 (Vulcanismo)Resultados 2 (Vulcanismo)
Resultados 2 (Vulcanismo)
 

Similar to Eng Slide3 (20)

Week12
Week12Week12
Week12
 
Ss
SsSs
Ss
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Encryption
EncryptionEncryption
Encryption
 
Information Security
Information SecurityInformation Security
Information Security
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
 
Week12
Week12Week12
Week12
 
Sw2
Sw2Sw2
Sw2
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 

More from S1715

Business all assignment
Business all assignmentBusiness all assignment
Business all assignmentS1715
 
Business all assignment
Business all assignmentBusiness all assignment
Business all assignmentS1715
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999S1715
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999S1715
 
Brine slide123
Brine slide123Brine slide123
Brine slide123S1715
 
Brine slide123
Brine slide123Brine slide123
Brine slide123S1715
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguideS1715
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguideS1715
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreportS1715
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreportS1715
 
Slide4
Slide4Slide4
Slide4S1715
 
Slide4
Slide4Slide4
Slide4S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3S1715
 
Slide2
Slide2Slide2
Slide2S1715
 

More from S1715 (16)

Business all assignment
Business all assignmentBusiness all assignment
Business all assignment
 
Business all assignment
Business all assignmentBusiness all assignment
Business all assignment
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999
 
Brine slide123
Brine slide123Brine slide123
Brine slide123
 
Brine slide123
Brine slide123Brine slide123
Brine slide123
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguide
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguide
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreport
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreport
 
Hat
HatHat
Hat
 
Slide4
Slide4Slide4
Slide4
 
Slide4
Slide4Slide4
Slide4
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Slide2
Slide2Slide2
Slide2
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Eng Slide3

  • 1. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 2. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.
  • 3. Symmetric Key Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. Public Key Encryption One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key.
  • 5. SSL and TLS In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.
  • 6. Hashing Algorithm The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.