SlideShare a Scribd company logo
How Encryption For Strong Security
              Works
●   Pseudoramdom Noise
●   Data Encryption
●   Link Encryption
●   VPN

                           s1170132 Manamu Abe
                         s1170133 Keigo Amma
                       s1170144 Ryo Kanno
                      s1170145 Masataka Kubota
Pseudoramdom Noise
●   In cryptography,
    pseudorandom noise
    (PRN) is signal similar
    to noise which satisfies
    one or more of the
    standard test for
    statistical randomness.
Data Encryption
●   Data encryption
    is a process in
    which plaintext
    data is
    converted into
    ciphertext so
    that it cannot be
    read.
Link Encryption
●   Link encryption is the
    data security process
    of encrypting
    information at the
    data link level as it is
    transmitted between
    two points within a
    network.
VPN
●VPN(Virtual Private
Network) is service to
connect data
communications
between systems.

●
  We can use public
lines like common
carrier leased lines with
VPN
REFERENCE
 Pseuderandom                     Noise
 http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache
 http://en.wikipedia.org/wiki/Pseudorandom_noise


 Data      Encryption
 http://www.wisegeek.com/what-is-data-encryption.htm
 http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm


 Link     Encryption
 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html
 http://www.palowireless.com/bluearticles/cc1_security1.asp


 VPN
 http://en.wikipedia.org/wiki/Vpn
  http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0

More Related Content

What's hot

Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
Muhammad Farooq Hussain
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
Henrik Jacobsen
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
Rohit malav
 
Cn ppt
Cn pptCn ppt
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
Henrik Kramshøj
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
Hemal Joshi
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
Roshan Chaudhary
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffersWanwen Wen
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Raj Sampat
 

What's hot (15)

Poster-A4
Poster-A4Poster-A4
Poster-A4
 
Cryptography
Cryptography Cryptography
Cryptography
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Kadai
KadaiKadai
Kadai
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Ss
SsSs
Ss
 

Viewers also liked

Yacht charters
Yacht chartersYacht charters
Yacht charters
AmazingCharters
 
Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009
ITbyTheSea
 
Accenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_reportAccenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_report
Blogatize.net
 
竺宇峰
竺宇峰竺宇峰
竺宇峰zust
 
SheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption InfographicSheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption Infographic
SheSpeaks Inc.
 
Earth Science Jeopardy
Earth Science JeopardyEarth Science Jeopardy
Earth Science JeopardyKVander
 
Atlanta Briefing Part 1
Atlanta Briefing Part 1Atlanta Briefing Part 1
Atlanta Briefing Part 1
chapel19
 
Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009Nupmonitor tbv PMO 3 December 2009
Good Advice
Good AdviceGood Advice
Good Advice
Juan Melendez
 
International Trade And Business
International Trade And BusinessInternational Trade And Business
International Trade And Businessecem
 
Lizeth And Jenny`S Project
Lizeth And Jenny`S ProjectLizeth And Jenny`S Project
Lizeth And Jenny`S Project
Johana Mendez Sarmiento
 
MANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORASMANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORAS
ANGIE ASTRID BAUTISTA
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
Dave King
 
Learningapps2
Learningapps2Learningapps2
Learningapps2skatelal
 
1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health 1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health
University of New Hampshire Health Services
 

Viewers also liked (20)

Yacht charters
Yacht chartersYacht charters
Yacht charters
 
Ssiivu1
Ssiivu1Ssiivu1
Ssiivu1
 
Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009
 
Accenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_reportAccenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_report
 
竺宇峰
竺宇峰竺宇峰
竺宇峰
 
Magico
MagicoMagico
Magico
 
SheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption InfographicSheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption Infographic
 
Savethedate3
Savethedate3Savethedate3
Savethedate3
 
Earth Science Jeopardy
Earth Science JeopardyEarth Science Jeopardy
Earth Science Jeopardy
 
Jupiterimages Catalog
Jupiterimages CatalogJupiterimages Catalog
Jupiterimages Catalog
 
Karina
KarinaKarina
Karina
 
Atlanta Briefing Part 1
Atlanta Briefing Part 1Atlanta Briefing Part 1
Atlanta Briefing Part 1
 
Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009
 
Good Advice
Good AdviceGood Advice
Good Advice
 
International Trade And Business
International Trade And BusinessInternational Trade And Business
International Trade And Business
 
Lizeth And Jenny`S Project
Lizeth And Jenny`S ProjectLizeth And Jenny`S Project
Lizeth And Jenny`S Project
 
MANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORASMANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORAS
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Learningapps2
Learningapps2Learningapps2
Learningapps2
 
1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health 1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health
 

Similar to Gps4b

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
Security F
Security FSecurity F
Security F
渉 田村
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Week13presen
Week13presenWeek13presen
Week13presen
s1160131
 
Week13
Week13Week13
Week13
kbmn731
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Vpn
Vpn Vpn
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
NetProtocol Xpert
 

Similar to Gps4b (20)

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Security F
Security FSecurity F
Security F
 
Group3
Group3Group3
Group3
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Ga13
Ga13Ga13
Ga13
 
Week13
Week13Week13
Week13
 
English2
English2English2
English2
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn
Vpn Vpn
Vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Week13
Week13Week13
Week13
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 

More from tykl94

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)tykl94
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationtykl94
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2tykl94
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2tykl94
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1tykl94
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3tykl94
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1tykl94
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5tykl94
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4tykl94
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3tykl94
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2tykl94
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1tykl94
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4tykl94
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3tykl94
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1tykl94
 
Week7 1m
Week7 1mWeek7 1m
Week7 1mtykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1tykl94
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignmenttykl94
 

More from tykl94 (20)

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentation
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1
 
Week7 1m
Week7 1mWeek7 1m
Week7 1m
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignment
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Gps4b

  • 1. How Encryption For Strong Security Works ● Pseudoramdom Noise ● Data Encryption ● Link Encryption ● VPN s1170132 Manamu Abe s1170133 Keigo Amma s1170144 Ryo Kanno s1170145 Masataka Kubota
  • 2. Pseudoramdom Noise ● In cryptography, pseudorandom noise (PRN) is signal similar to noise which satisfies one or more of the standard test for statistical randomness.
  • 3. Data Encryption ● Data encryption is a process in which plaintext data is converted into ciphertext so that it cannot be read.
  • 4. Link Encryption ● Link encryption is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.
  • 5. VPN ●VPN(Virtual Private Network) is service to connect data communications between systems. ● We can use public lines like common carrier leased lines with VPN
  • 6. REFERENCE  Pseuderandom Noise http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache http://en.wikipedia.org/wiki/Pseudorandom_noise  Data Encryption http://www.wisegeek.com/what-is-data-encryption.htm http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm  Link Encryption http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html http://www.palowireless.com/bluearticles/cc1_security1.asp  VPN http://en.wikipedia.org/wiki/Vpn http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0