SlideShare a Scribd company logo
Group Web Presentation week 13

How Encryption for Strong Security
             Works
          s1160020   Kotomi Ishida
          s1160022   Yuki Izumi
          s1160023   Kazuya Ito
          s1160026   Masahiro Inoue
Encryption for strong security


Network use various encryption systems
that help my private from others. So we
 must encrypt information when we use
                Internet.
Data Encryption

              The real data is
          ●

              buried in the
              pseudorandom
              “noise.”This is
              called data
              encryption.
File Encryption


    Local file
●

    encryption
    protects data from
    physical intrusion
Link Encryption
                 This is an
             ●

                 approach to
                 communications
                 security that
                 encrypts and
                 decypts all
                 traffic at each
                 end of
                 communications
                 line.
Key
  In cryptography, a key is a piece of information
(a parameter) that determines the functional output
 of a cryptographic algorithm or cipher. Without a
      key, the algorithm would have no result.
    In encryption, a key specifies the particular
transformation of plaintext into ciphertext, or vice
   versa during decryption. Keys are also used in
  other cryptographic algorithms, such as digital
  signature schemes and message authentication
                        codes.

More Related Content

What's hot

Sw2
Sw2Sw2
CSO Security Standard Conference NYC 2012
CSO Security Standard Conference NYC 2012CSO Security Standard Conference NYC 2012
CSO Security Standard Conference NYC 2012
Ulf Mattsson
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
LeMeniz Infotech
 
Week13 Presen
Week13 PresenWeek13 Presen
Week13 Presen
guest2a905e
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
LeMeniz Infotech
 
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGEPRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
I3E Technologies
 
Sw week12
Sw week12Sw week12
Sw week12
s1200009
 
How encryption work
How encryption workHow encryption work
How encryption work
Yosuke Takabatake
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 
Cn ppt
Cn pptCn ppt
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
Prancer Io
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
CheapSSLsecurity
 
s117
s117s117
s117
s1170034
 
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
Mekhi Da ‘Quay Daniels
 

What's hot (18)

Sw2
Sw2Sw2
Sw2
 
CSO Security Standard Conference NYC 2012
CSO Security Standard Conference NYC 2012CSO Security Standard Conference NYC 2012
CSO Security Standard Conference NYC 2012
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Week13 Presen
Week13 PresenWeek13 Presen
Week13 Presen
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGEPRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
 
Sw week12
Sw week12Sw week12
Sw week12
 
How encryption work
How encryption workHow encryption work
How encryption work
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Encryption
EncryptionEncryption
Encryption
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
s117
s117s117
s117
 
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
 

Viewers also liked

Ten Things You Can Now Do Post-Conference
Ten Things You Can Now Do Post-ConferenceTen Things You Can Now Do Post-Conference
Ten Things You Can Now Do Post-Conference
Jeanette Murphy
 
The Brazilian Option
The Brazilian Option The Brazilian Option
The Brazilian Option
Mely Lerman
 
Newt and salamander
Newt and salamanderNewt and salamander
Newt and salamander
Isabel Rojo
 
Native tmg
Native tmgNative tmg
Native tmg
Bart Brouwers
 
Profil tik cerdas
Profil tik cerdasProfil tik cerdas
Profil tik cerdas
Novianto Raharjo
 
Putauaki Primary Inquiry Learning Tackle Box Stages
Putauaki Primary Inquiry Learning Tackle Box StagesPutauaki Primary Inquiry Learning Tackle Box Stages
Putauaki Primary Inquiry Learning Tackle Box Stages
Jeanette Murphy
 
Print Media Today - Breda, NHTV 05102014
Print Media Today - Breda, NHTV 05102014Print Media Today - Breda, NHTV 05102014
Print Media Today - Breda, NHTV 05102014
Bart Brouwers
 
Lasterketa plana prestatzeko tailerra
Lasterketa plana prestatzeko tailerraLasterketa plana prestatzeko tailerra
Lasterketa plana prestatzeko tailerraKirolPsikologia
 
Open Vpn – Poor Man’S Vpn Solution
Open Vpn – Poor Man’S Vpn SolutionOpen Vpn – Poor Man’S Vpn Solution
Open Vpn – Poor Man’S Vpn Solution
guest782598d5
 
Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)
Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)
Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)
Jeanette Murphy
 
Beautiful Russia
Beautiful RussiaBeautiful Russia
Beautiful Russia
gpsinc
 
Spyder Advisor Capabilities
Spyder Advisor CapabilitiesSpyder Advisor Capabilities
Spyder Advisor Capabilities
Jeannine Ritter
 
Holidayfun 1
Holidayfun 1Holidayfun 1
Holidayfun 1
johnstevens
 
C:\documents and settings\beheerder\my documents\hyperlocal\10rules
C:\documents and settings\beheerder\my documents\hyperlocal\10rulesC:\documents and settings\beheerder\my documents\hyperlocal\10rules
C:\documents and settings\beheerder\my documents\hyperlocal\10rules
Bart Brouwers
 
Where Humanity Cries
Where Humanity CriesWhere Humanity Cries
Where Humanity Cries
diretruth
 
E52 expat top 10 2016
E52 expat top 10 2016E52 expat top 10 2016
E52 expat top 10 2016
Bart Brouwers
 
2009
20092009
2009
miicaelaa
 
My God, It's Full of Stars: Your Guide to a Visual Design Career
My God, It's Full of Stars: Your Guide to a Visual Design CareerMy God, It's Full of Stars: Your Guide to a Visual Design Career
My God, It's Full of Stars: Your Guide to a Visual Design Career
Michael Fienen
 

Viewers also liked (20)

Ten Things You Can Now Do Post-Conference
Ten Things You Can Now Do Post-ConferenceTen Things You Can Now Do Post-Conference
Ten Things You Can Now Do Post-Conference
 
The Brazilian Option
The Brazilian Option The Brazilian Option
The Brazilian Option
 
Newt and salamander
Newt and salamanderNewt and salamander
Newt and salamander
 
Native tmg
Native tmgNative tmg
Native tmg
 
Profil tik cerdas
Profil tik cerdasProfil tik cerdas
Profil tik cerdas
 
Putauaki Primary Inquiry Learning Tackle Box Stages
Putauaki Primary Inquiry Learning Tackle Box StagesPutauaki Primary Inquiry Learning Tackle Box Stages
Putauaki Primary Inquiry Learning Tackle Box Stages
 
Print Media Today - Breda, NHTV 05102014
Print Media Today - Breda, NHTV 05102014Print Media Today - Breda, NHTV 05102014
Print Media Today - Breda, NHTV 05102014
 
Lasterketa plana prestatzeko tailerra
Lasterketa plana prestatzeko tailerraLasterketa plana prestatzeko tailerra
Lasterketa plana prestatzeko tailerra
 
Hamlet Moeder
Hamlet MoederHamlet Moeder
Hamlet Moeder
 
Open Vpn – Poor Man’S Vpn Solution
Open Vpn – Poor Man’S Vpn SolutionOpen Vpn – Poor Man’S Vpn Solution
Open Vpn – Poor Man’S Vpn Solution
 
Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)
Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)
Putauaki Primary Inquiry Learning Tackle Box Stages (Colour Coded)
 
Beautiful Russia
Beautiful RussiaBeautiful Russia
Beautiful Russia
 
Uploaden
Uploaden Uploaden
Uploaden
 
Spyder Advisor Capabilities
Spyder Advisor CapabilitiesSpyder Advisor Capabilities
Spyder Advisor Capabilities
 
Holidayfun 1
Holidayfun 1Holidayfun 1
Holidayfun 1
 
C:\documents and settings\beheerder\my documents\hyperlocal\10rules
C:\documents and settings\beheerder\my documents\hyperlocal\10rulesC:\documents and settings\beheerder\my documents\hyperlocal\10rules
C:\documents and settings\beheerder\my documents\hyperlocal\10rules
 
Where Humanity Cries
Where Humanity CriesWhere Humanity Cries
Where Humanity Cries
 
E52 expat top 10 2016
E52 expat top 10 2016E52 expat top 10 2016
E52 expat top 10 2016
 
2009
20092009
2009
 
My God, It's Full of Stars: Your Guide to a Visual Design Career
My God, It's Full of Stars: Your Guide to a Visual Design CareerMy God, It's Full of Stars: Your Guide to a Visual Design Career
My God, It's Full of Stars: Your Guide to a Visual Design Career
 

Similar to Gwp Week13

Security F
Security FSecurity F
Security F
渉 田村
 
Cryptography
CryptographyCryptography
Cryptography
Dipti Sakpal
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
 
Cryptography ppt
Cryptography pptCryptography ppt
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
PrabhatMishraAbvp
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
vinitajain703
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
BARATH800940
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
RiddhiGupta84
 
Gps4b
Gps4bGps4b
Gps4b
shacho
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slide
tykl94
 
Gps4
Gps4Gps4
Gps4b
Gps4bGps4b
Gps4b
tykl94
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
karthikvcyber
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
PayalChopra9
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
Twinkal Harsora
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
s116num
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
KuntalSasmal1
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
yuki0722_0007
 

Similar to Gwp Week13 (20)

Security F
Security FSecurity F
Security F
 
Cryptography
CryptographyCryptography
Cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
PresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.pptPresentationonCRYPTOGRAPHYppt.ppt
PresentationonCRYPTOGRAPHYppt.ppt
 
Presentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHYPresentationon ON THE TOPIC CRYPTOGRAPHY
Presentationon ON THE TOPIC CRYPTOGRAPHY
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
PRESENTATION ON CRYPTOGRAPHY.pptx
PRESENTATION ON  CRYPTOGRAPHY.pptxPRESENTATION ON  CRYPTOGRAPHY.pptx
PRESENTATION ON CRYPTOGRAPHY.pptx
 
Gps4b
Gps4bGps4b
Gps4b
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slide
 
Gps4
Gps4Gps4
Gps4
 
Gps4b
Gps4bGps4b
Gps4b
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.pptCRYPTOGRAPHY-PAYAL CHOPRA.ppt
CRYPTOGRAPHY-PAYAL CHOPRA.ppt
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
CSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptxCSE CRYPTOGRAPHY ppt - Copy.pptx
CSE CRYPTOGRAPHY ppt - Copy.pptx
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 

Recently uploaded

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Gwp Week13

  • 1. Group Web Presentation week 13 How Encryption for Strong Security Works s1160020 Kotomi Ishida s1160022 Yuki Izumi s1160023 Kazuya Ito s1160026 Masahiro Inoue
  • 2. Encryption for strong security Network use various encryption systems that help my private from others. So we must encrypt information when we use Internet.
  • 3. Data Encryption The real data is ● buried in the pseudorandom “noise.”This is called data encryption.
  • 4. File Encryption Local file ● encryption protects data from physical intrusion
  • 5. Link Encryption This is an ● approach to communications security that encrypts and decypts all traffic at each end of communications line.
  • 6. Key In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would have no result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. Keys are also used in other cryptographic algorithms, such as digital signature schemes and message authentication codes.