How Encryption Works
 Encryption is a system to give some
 information files such as zip and lhz key
 rocks. The files that are made are made
 as hidden files are encrypted files. It’s
 covered files on that’s surface by protect
 key and protect information.
Encryptions Security System
Symmetric Key System
• Computers usually use symmetric encryption that is
  shared by secret code to send information
  between each other. They must have the some
  keys. Symmetric key is known to information sender
  and receiver. In any network, nobody knows this
  information encrypted with symmetric key without
  them, sees and reads it. One character such like A
  and Z is 128 bit key, and it can have more three
  hundred decillion key combinations to encrypt.
Public Key Encryption System

• The public key encryption system has two types of
  key. One is secret key. This key is made by only one
  user, and this is the key to decrypt information. Two
  is public key. It can encrypt information, and can’t
  decrypt encrypted information. Only user who has
  secret key can see and read encrypted information.
  This system is very ideal encryption system to use
  cryptogram in today’s network.
SSL and TLS

• Secure Sockets Layer (SSL) is an Internet security
  protocol, and it is included in Transport Layer
  Security (TLS) that is also a security protocol. These
  main system is a function to encrypt data
  transported in Web browser to access it. This
  process is done between client and server.
Hashing Algorithm
• The encryption system uses many hash algorithm
  functions. It changes inputted number data to hash
  values to use Hashing algorithm.

How encryption works

  • 1.
    How Encryption Works Encryption is a system to give some information files such as zip and lhz key rocks. The files that are made are made as hidden files are encrypted files. It’s covered files on that’s surface by protect key and protect information.
  • 2.
  • 3.
    Symmetric Key System •Computers usually use symmetric encryption that is shared by secret code to send information between each other. They must have the some keys. Symmetric key is known to information sender and receiver. In any network, nobody knows this information encrypted with symmetric key without them, sees and reads it. One character such like A and Z is 128 bit key, and it can have more three hundred decillion key combinations to encrypt.
  • 4.
    Public Key EncryptionSystem • The public key encryption system has two types of key. One is secret key. This key is made by only one user, and this is the key to decrypt information. Two is public key. It can encrypt information, and can’t decrypt encrypted information. Only user who has secret key can see and read encrypted information. This system is very ideal encryption system to use cryptogram in today’s network.
  • 5.
    SSL and TLS •Secure Sockets Layer (SSL) is an Internet security protocol, and it is included in Transport Layer Security (TLS) that is also a security protocol. These main system is a function to encrypt data transported in Web browser to access it. This process is done between client and server.
  • 6.
    Hashing Algorithm • Theencryption system uses many hash algorithm functions. It changes inputted number data to hash values to use Hashing algorithm.