SlideShare a Scribd company logo
Introduction to How Encryption
               Works
When we use the Internet, we're not always just
       clicking around and passively taking in
   information, such as reading news articles or
     blog posts -- a great deal of our time online
   involves sending others our own information.
  Ordering something over the Internet, whether
it's a book, a CD or anything else from an online
    vendor, or signing up for an online account,
    requires entering in a good deal of sensitive
                 personal information.
Security Encryption Systems

The Greek historian Plutarch wrote, for example, about
  Spartan generals who sent and received sensitive
messages using a scytale, a thin cylinder made out of
 wood. The general would wrap a piece of parchment
  around the scytale and write his message along its
 length. When someone removed the paper from the
    cylinder, the writing appeared to be a jumble of
    nonsense. But if the other general receiving the
parchment had a scytale of similar size, he could wrap
   the paper around it and easily read the intended
                        message.
Symmetric Key
 Just like two Spartan generals sending messages to each
 other, computers using symmetric-key encryption to send
 information between each other must have the same key.

 In symmetric-key encryption, each computer has a secret
key (code) that it can use to encrypt a packet of information
   before it is sent over the network to another computer.
Symmetric-key requires that you know which computers will
 be talking to each other so you can install the key on each
one. Symmetric-key encryption is essentially the same as a
 secret code that each of the two computers must know in
order to decode the information. The code provides the key
                  to decoding the message.
Public Key Encryption

  One of the weaknesses some point out about
   symmetric key encryption is that two users
attempting to communicate with each other need
  a secure way to do so; otherwise, an attacker
  can easily pluck the necessary data from the
     stream. Also known as asymmetric-key
   encryption, public-key encryption uses two
   different keys at once -- a combination of a
           private key and a public key.
SSL and TLS

  In your browser, you can tell when you are using a
secure protocol, such as TLS, in a couple of different
ways. You will notice that the "http" in the address line
 is replaced with "https," and you should see a small
padlock in the status bar at the bottom of the browser
window. When you're accessing sensitive information,
such as an online bank account or a payment transfer
service like PayPal or Google Checkout, chances are
 you'll see this type of format change and know your
    information will most likely pass along securely.
Hashing Algorithm

The key in public-key encryption is based on a
 hash value. This is a value that is computed
  from a base input number using a hashing
   algorithm. Essentially, the hash value is a
 summary of the original value. The important
  thing about a hash value is that it is nearly
impossible to derive the original input number
 without knowing the data used to create the
                  hash value.

More Related Content

Viewers also liked

Activity 3
Activity 3Activity 3
Activity 3
Kimberley Tran
 
Coolpictures
CoolpicturesCoolpictures
Coolpictures
Mariussnm
 
Развитие идеи Проекта Мечты
Развитие идеи Проекта МечтыРазвитие идеи Проекта Мечты
Развитие идеи Проекта Мечты
DrupalSPB
 
Farel Seminary
Farel SeminaryFarel Seminary
Farel Seminary
cadjemian
 
Week4
Week4Week4
Week4
s1160153
 
Presentación1 topologia
Presentación1 topologiaPresentación1 topologia
Presentación1 topologia
ELIZABETHMEDINAGARCIA
 
Les revues en open access
Les revues en open accessLes revues en open access
Les revues en open access
scduag
 
We Love コンビニ
We Love コンビニWe Love コンビニ
We Love コンビニ
bluedoragon1
 
Evaluation questions
Evaluation questionsEvaluation questions
Evaluation questions
Amna Qaiser
 

Viewers also liked (9)

Activity 3
Activity 3Activity 3
Activity 3
 
Coolpictures
CoolpicturesCoolpictures
Coolpictures
 
Развитие идеи Проекта Мечты
Развитие идеи Проекта МечтыРазвитие идеи Проекта Мечты
Развитие идеи Проекта Мечты
 
Farel Seminary
Farel SeminaryFarel Seminary
Farel Seminary
 
Week4
Week4Week4
Week4
 
Presentación1 topologia
Presentación1 topologiaPresentación1 topologia
Presentación1 topologia
 
Les revues en open access
Les revues en open accessLes revues en open access
Les revues en open access
 
We Love コンビニ
We Love コンビニWe Love コンビニ
We Love コンビニ
 
Evaluation questions
Evaluation questionsEvaluation questions
Evaluation questions
 

Similar to Eng Slide3

Week12
Week12Week12
Week12
Ma310Shi
 
Ss
SsSs
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
Week12 b
Week12 bWeek12 b
Week12 b
Takuma Abe
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
encryption
encryptionencryption
encryption
s1170037
 
Encryption
EncryptionEncryption
Encryption
s1170037
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
s117
s117s117
s117
s1170034
 
Information Security
Information SecurityInformation Security
Information Security
Presentaionslive.blogspot.com
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
Pavithra Muthu
 

Similar to Eng Slide3 (20)

Week12
Week12Week12
Week12
 
Ss
SsSs
Ss
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Encryption
EncryptionEncryption
Encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
s117
s117s117
s117
 
Information Security
Information SecurityInformation Security
Information Security
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
 

More from S1715

Business all assignment
Business all assignmentBusiness all assignment
Business all assignment
S1715
 
Business all assignment
Business all assignmentBusiness all assignment
Business all assignment
S1715
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999
S1715
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999
S1715
 
Brine slide123
Brine slide123Brine slide123
Brine slide123
S1715
 
Brine slide123
Brine slide123Brine slide123
Brine slide123
S1715
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguide
S1715
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguide
S1715
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreport
S1715
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreport
S1715
 
Slide4
Slide4Slide4
Slide4
S1715
 
Slide4
Slide4Slide4
Slide4
S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Slide2
Slide2Slide2
Slide2
S1715
 

More from S1715 (16)

Business all assignment
Business all assignmentBusiness all assignment
Business all assignment
 
Business all assignment
Business all assignmentBusiness all assignment
Business all assignment
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999
 
Brine nslide999
Brine nslide999Brine nslide999
Brine nslide999
 
Brine slide123
Brine slide123Brine slide123
Brine slide123
 
Brine slide123
Brine slide123Brine slide123
Brine slide123
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguide
 
Brine 11 instguide
Brine 11 instguideBrine 11 instguide
Brine 11 instguide
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreport
 
Brine fesreport
Brine fesreportBrine fesreport
Brine fesreport
 
Hat
HatHat
Hat
 
Slide4
Slide4Slide4
Slide4
 
Slide4
Slide4Slide4
Slide4
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Slide2
Slide2Slide2
Slide2
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Eng Slide3

  • 1. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 2. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.
  • 3. Symmetric Key Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. Public Key Encryption One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key.
  • 5. SSL and TLS In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.
  • 6. Hashing Algorithm The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.