SlideShare a Scribd company logo
How Encryption for Strong
         Security Work



Member:
s1160138 Wataru Tamura
s1160139 Ryo Tayama
s1160140 Kiyoto Tanji
s1160142 Satoshi Tsuchida
Networks use encryption for strong security



    Data encryption
●




    File encryption
●




    Link encryption
●
Data encryption


    A data encryption
●

    program uses a string
     of numbers called a
    key.
    A key create a stream
●

    of data combining the
    real information with
    a pseudorandom
    stream of bits.
File encryption


    File encryption protects files in central servers
●

    and mass-storage devices from being read or
    changed without an encryption key.
    Local file encryption also protects data from
●

    physical instruction.
Link encryption


    The PC's encrypted
●

    data, enclosed in
    unencrypted TCP/IP
    and Ethernet packets,
    crosses the network.
    Routers can use
●

    encryption between
    themselves to protect
    the entire stream of
    data.
Reference


    http://www.softdesignz.com/nav/images/secretkey.gif
●



    http://mkpe.com/digital_cinema/images/phase_2_sm.gif
●

More Related Content

What's hot

Week13
Week13Week13
Week13
shuwahei331
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
Michael Boman
 
Week13 Presen
Week13 PresenWeek13 Presen
Week13 Presen
guest2a905e
 
Cisco security
Cisco securityCisco security
Cisco security
ankitha anu
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
D Y PATIL COLLEGE OF ENGINEERING PUNE
 
Pretty good privacy - Email Security
Pretty good privacy - Email SecurityPretty good privacy - Email Security
Pretty good privacy - Email Security
Rakesh Mittal
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
Qaisar Ayub
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
limsh
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
guestf50fcba
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
Christopher Dubois
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
Sufficientgrace
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
MLG College of Learning, Inc
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
An Dy L
 
Network security
Network securityNetwork security
Network security
Raaz Karkee
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
DarraghCommsec
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Adri Jovin
 

What's hot (17)

Week13
Week13Week13
Week13
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
Week13 Presen
Week13 PresenWeek13 Presen
Week13 Presen
 
Cisco security
Cisco securityCisco security
Cisco security
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
Pretty good privacy - Email Security
Pretty good privacy - Email SecurityPretty good privacy - Email Security
Pretty good privacy - Email Security
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
BAIT1103 Chapter 5
BAIT1103 Chapter 5BAIT1103 Chapter 5
BAIT1103 Chapter 5
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
 
Network security
Network securityNetwork security
Network security
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Viewers also liked

Luxpresentation4workshopparticipants
Luxpresentation4workshopparticipantsLuxpresentation4workshopparticipants
Luxpresentation4workshopparticipants
Tom De Schryver
 
20081127001
2008112700120081127001
20081127001jbadenes
 
Pp6
Pp6Pp6
20081201001
2008120100120081201001
20081201001jbadenes
 
Small Fryz Logo
Small Fryz LogoSmall Fryz Logo
Small Fryz Logo
randylim
 
La9.2 Bratcher B
La9.2 Bratcher BLa9.2 Bratcher B
La9.2 Bratcher B
RLBratchertabetha
 
7.1.1twistedpair
7.1.1twistedpair7.1.1twistedpair
7.1.1twistedpair
Talia Carbis
 
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de LewisTeoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Jesús Flores
 
20081121001
2008112100120081121001
20081121001jbadenes
 
Lodi
LodiLodi
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?ungian iunn
 
20081223003
2008122300320081223003
20081223003jbadenes
 
Auditive Architecture
Auditive ArchitectureAuditive Architecture
Auditive Architecture
ernstkabel
 
20081210001
2008121000120081210001
20081210001jbadenes
 
20081220001
2008122000120081220001
20081220001jbadenes
 
Los Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De LaLos Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De LaJorge Vera
 
20080830001
2008083000120080830001
20080830001jbadenes
 
ACT Theatre Invite
ACT Theatre InviteACT Theatre Invite
ACT Theatre Invite
randylim
 

Viewers also liked (20)

Luxpresentation4workshopparticipants
Luxpresentation4workshopparticipantsLuxpresentation4workshopparticipants
Luxpresentation4workshopparticipants
 
20081127001
2008112700120081127001
20081127001
 
Pp6
Pp6Pp6
Pp6
 
20081201001
2008120100120081201001
20081201001
 
Cleopatra Stratan 2
Cleopatra Stratan 2Cleopatra Stratan 2
Cleopatra Stratan 2
 
Small Fryz Logo
Small Fryz LogoSmall Fryz Logo
Small Fryz Logo
 
La9.2 Bratcher B
La9.2 Bratcher BLa9.2 Bratcher B
La9.2 Bratcher B
 
7.1.1twistedpair
7.1.1twistedpair7.1.1twistedpair
7.1.1twistedpair
 
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de LewisTeoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
Teoría atómica, configuración electrónica, tabla periódica y estructura de Lewis
 
20081121001
2008112100120081121001
20081121001
 
Lodi
LodiLodi
Lodi
 
менск минск
менск   минскменск   минск
менск минск
 
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
「D+」推出聰明衣服搭配系統,網拍平台之後的第2次網商大串連?
 
20081223003
2008122300320081223003
20081223003
 
Auditive Architecture
Auditive ArchitectureAuditive Architecture
Auditive Architecture
 
20081210001
2008121000120081210001
20081210001
 
20081220001
2008122000120081220001
20081220001
 
Los Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De LaLos Fundamentos FilolóGicos De La InvestigacióN De La
Los Fundamentos FilolóGicos De La InvestigacióN De La
 
20080830001
2008083000120080830001
20080830001
 
ACT Theatre Invite
ACT Theatre InviteACT Theatre Invite
ACT Theatre Invite
 

Similar to Security F

Week13
Week13Week13
Week13
Satosyu
 
Week13
Week13Week13
Week13
Satosyu
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
s1170087
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
I M
 
Week13
Week13Week13
Week13
s1160122
 
Gps4b
Gps4bGps4b
Gps4b
shacho
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slide
tykl94
 
Gps4
Gps4Gps4
Gps4b
Gps4bGps4b
Gps4b
tykl94
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
eyad alaa
 
Group3
Group3Group3
Group3
guestec3fa4
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 
presenw13
presenw13presenw13
presenw13
guest179b94
 
Homework4
Homework4Homework4
Homework4
noblesseoblige6
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
Robb Boyd
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 

Similar to Security F (20)

Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Week13
Week13Week13
Week13
 
Gps4b
Gps4bGps4b
Gps4b
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slide
 
Gps4
Gps4Gps4
Gps4
 
Gps4b
Gps4bGps4b
Gps4b
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Group3
Group3Group3
Group3
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
presenw13
presenw13presenw13
presenw13
 
Homework4
Homework4Homework4
Homework4
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Security F

  • 1. How Encryption for Strong Security Work Member: s1160138 Wataru Tamura s1160139 Ryo Tayama s1160140 Kiyoto Tanji s1160142 Satoshi Tsuchida
  • 2. Networks use encryption for strong security Data encryption ● File encryption ● Link encryption ●
  • 3. Data encryption A data encryption ● program uses a string of numbers called a key. A key create a stream ● of data combining the real information with a pseudorandom stream of bits.
  • 4. File encryption File encryption protects files in central servers ● and mass-storage devices from being read or changed without an encryption key. Local file encryption also protects data from ● physical instruction.
  • 5. Link encryption The PC's encrypted ● data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Routers can use ● encryption between themselves to protect the entire stream of data.
  • 6. Reference http://www.softdesignz.com/nav/images/secretkey.gif ● http://mkpe.com/digital_cinema/images/phase_2_sm.gif ●