SlideShare a Scribd company logo
How Encryption Works




       S1190021
      Manri Terada
Introduction to How Encryption
               Works

When we use the Internet, we're not always just clicking around
and passively taking in information, such as reading news
articles or blog posts -- a great deal of our time online involves
sending others our own information. Ordering something over
the Internet, whether it's a book, a CD or anything else from an
online vendor, or signing up for an online account, requires
entering in a good deal of sensitive personal information. A
typical transaction might include not only our names, e-mail
addresses and physical address and phone number, but also
passwords and personal identification numbers (PINs).
Security Encryption Systems
The Greek historian Plutarch wrote, for example, about
Spartan generals who sent and received sensitive messages
using a scytale, a thin cylinder made out of wood. The
general would wrap a piece of parchment around the scytale
and write his message along its length. When someone
removed the paper from the cylinder, the writing appeared
to be a jumble of nonsense. But if the other general
receiving the parchment had a scytale of similar size, he
could wrap the paper around it and easily read the intended
message.
Symmetric Key
In symmetric-key encryption, each computer has a secret
key (code) that it can use to encrypt a packet of information
before it is sent over the network to another computer.
Symmetric-key requires that you know which computers
will be talking to each other so you can install the key on
each one. Symmetric-key encryption is essentially the same
as a secret code that each of the two computers must know
in order to decode the information. The code provides the
key to decoding the message. Think of it like this: You
create a coded message to send to a friend in which each
letter is substituted with the letter that is two down from it in
the alphabet. So "A" becomes "C," and "B" becomes "D".
You have already told a trusted friend that the code is "Shift
by 2". Your friend gets the message and decodes it. Anyone
else who sees the message will see only nonsense.
Public Key Encryption
Also known as asymmetric-key encryption, public-key
encryption uses two different keys at once -- a combination
of a private key and a public key. The private key is known
only to your computer, while the public key is given by your
computer to any computer that wants to communicate
securely with it. To decode an encrypted message, a
computer must use the public key, provided by the
originating computer, and its own private key.
SSL and TLS
In your browser, you can tell when you are using a secure
protocol, such as TLS, in a couple of different ways. You
will notice that the "http" in the address line is replaced with
"https," and you should see a small padlock in the status bar
at the bottom of the browser window. When you're
accessing sensitive information, such as an online bank
account or a payment transfer service like PayPal or Google
Checkout, chances are you'll see this type of format change
and know your information will most likely pass along
securely.

More Related Content

Viewers also liked

My top five
My top fiveMy top five
My top five
banevici89
 
Penyusunan iso 9001
Penyusunan iso 9001Penyusunan iso 9001
Penyusunan iso 9001
frisca maulida
 
My top five
My top fiveMy top five
My top five
banevici89
 
HMS
HMSHMS
HMS
maskloo
 
Homework2
Homework2Homework2
Homework2
trd10000
 
Ohsas 18001 2007 dual language
Ohsas 18001 2007 dual languageOhsas 18001 2007 dual language
Ohsas 18001 2007 dual language
frisca maulida
 
Person1
Person1Person1
Person1
trd10000
 
Homework1
Homework1Homework1
Homework1
trd10000
 
Che guevara revolusi kuba
Che guevara   revolusi kubaChe guevara   revolusi kuba
Che guevara revolusi kuba
frisca maulida
 
Penjambung lidah rakjat_soukarno
Penjambung lidah rakjat_soukarnoPenjambung lidah rakjat_soukarno
Penjambung lidah rakjat_soukarno
frisca maulida
 
Bj habibi detik-detik yang menentukan
Bj habibi   detik-detik yang menentukanBj habibi   detik-detik yang menentukan
Bj habibi detik-detik yang menentukan
frisca maulida
 
Osha2254 standart & training guidens
Osha2254 standart & training guidensOsha2254 standart & training guidens
Osha2254 standart & training guidens
frisca maulida
 
Acid base
Acid baseAcid base
Langkah pelaksanaan sml u sertifikasi iso 14001
Langkah pelaksanaan sml u sertifikasi iso 14001Langkah pelaksanaan sml u sertifikasi iso 14001
Langkah pelaksanaan sml u sertifikasi iso 14001
frisca maulida
 
3220 warehouse
3220 warehouse3220 warehouse
3220 warehouse
Eky Susilowati
 
national income accounting
national income accountingnational income accounting
national income accounting
Ruchi reddy
 

Viewers also liked (16)

My top five
My top fiveMy top five
My top five
 
Penyusunan iso 9001
Penyusunan iso 9001Penyusunan iso 9001
Penyusunan iso 9001
 
My top five
My top fiveMy top five
My top five
 
HMS
HMSHMS
HMS
 
Homework2
Homework2Homework2
Homework2
 
Ohsas 18001 2007 dual language
Ohsas 18001 2007 dual languageOhsas 18001 2007 dual language
Ohsas 18001 2007 dual language
 
Person1
Person1Person1
Person1
 
Homework1
Homework1Homework1
Homework1
 
Che guevara revolusi kuba
Che guevara   revolusi kubaChe guevara   revolusi kuba
Che guevara revolusi kuba
 
Penjambung lidah rakjat_soukarno
Penjambung lidah rakjat_soukarnoPenjambung lidah rakjat_soukarno
Penjambung lidah rakjat_soukarno
 
Bj habibi detik-detik yang menentukan
Bj habibi   detik-detik yang menentukanBj habibi   detik-detik yang menentukan
Bj habibi detik-detik yang menentukan
 
Osha2254 standart & training guidens
Osha2254 standart & training guidensOsha2254 standart & training guidens
Osha2254 standart & training guidens
 
Acid base
Acid baseAcid base
Acid base
 
Langkah pelaksanaan sml u sertifikasi iso 14001
Langkah pelaksanaan sml u sertifikasi iso 14001Langkah pelaksanaan sml u sertifikasi iso 14001
Langkah pelaksanaan sml u sertifikasi iso 14001
 
3220 warehouse
3220 warehouse3220 warehouse
3220 warehouse
 
national income accounting
national income accountingnational income accounting
national income accounting
 

Similar to Homework1

Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Week12
Week12Week12
Week12
Week12Week12
Week12
keikokuwana
 
Ss
SsSs
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
encryption
encryptionencryption
encryption
s1170037
 
Encryption
EncryptionEncryption
Encryption
s1170037
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
Amazon
AmazonAmazon
Amazon
yuyatamaru
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Kadai1
Kadai1Kadai1
Kadai1
s1190105
 

Similar to Homework1 (20)

Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Ss
SsSs
Ss
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Encryption
EncryptionEncryption
Encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Kadai1
Kadai1Kadai1
Kadai1
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Homework1

  • 1. How Encryption Works S1190021 Manri Terada
  • 2. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs).
  • 3. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.
  • 4. Symmetric Key In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message. Think of it like this: You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.
  • 5. Public Key Encryption Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
  • 6. SSL and TLS In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.