SlideShare a Scribd company logo
1 of 6
Download to read offline
Introduction of the Encryption
●   We have a lot of information that we don't want
    other users to see. For example the following
    things.
●   Credit card information
●   Private correspondence
●   Personal details data
●   Bank account information
●   Etc.
Encryption Systems to security



Encryption has been a long time in various ways.
    Encryption is used especially for military
  purposes. Encryption has been created by
  combining the number and text. Today, the
  encryption more well known as algorithms.
Symmetric key encryption


 Symmetric key encryption is thing
that encrypt and decrypt the same
to use the key cryptography. Each
   computer has a secret key in
     symmetric key encryption
Public key cryptosystem



Public key encryption is a method to
   expose the encryption key for
 encrypted using separate keys for
     encryption and decryption.
TLS(Transport Layer Security)

    Transport Layer Security is a
  protocol that required security for
 communication. This protocol often
   has called SSL(Secure Sockets
     Layer frequently).The SSL
    encryption provides the ability
authentication and tamper detection.
Hash function


   The key of public key encryption is based on a
 hash value. It is a value that is computed from a
base input number using a hashing function. Hash
functions are incorporated into the hash algorithm.
   Hash function is used to detect tampering and
  processing speed of the search speed and data
                    comparison.

More Related Content

What's hot

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Worksray0510711s
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingCheapSSLsecurity
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
 
Data encryption
Data encryptionData encryption
Data encryptionAman Jain
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyGayathridevi120
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
How encryption works
How encryption worksHow encryption works
How encryption worksaizu_u-11911
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3S1715
 

What's hot (19)

Sw2
Sw2Sw2
Sw2
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption
EncryptionEncryption
Encryption
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 

Viewers also liked

Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdfs1190088
 
Pag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi BehrPag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi Behrheidibehr2011
 
Sw D prezen1pdf
Sw D prezen1pdfSw D prezen1pdf
Sw D prezen1pdfs1190088
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdfs1190088
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obps1190088
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdfs1190088
 
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)hamahama 34
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdfs1190088
 
150417 arc flash data center
150417 arc flash data center150417 arc flash data center
150417 arc flash data centergarygohcs
 
Volunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyVolunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyMastura Mohd Rashid
 
Introduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesIntroduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesMangesh Wagh
 
Susiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusie Brishaber
 
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Anthony Deydier
 

Viewers also liked (18)

Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
Pag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi BehrPag web skoliosis- Heidi Behr
Pag web skoliosis- Heidi Behr
 
Sw D prezen1pdf
Sw D prezen1pdfSw D prezen1pdf
Sw D prezen1pdf
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Sw2 prezen2.obp
Sw2 prezen2.obpSw2 prezen2.obp
Sw2 prezen2.obp
 
Sepsis powerpoints
Sepsis powerpointsSepsis powerpoints
Sepsis powerpoints
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
スマートフォンアプリ開発小話(岡山WEBクリエイターズ)
 
Sw prezen1pdf
Sw prezen1pdfSw prezen1pdf
Sw prezen1pdf
 
150417 arc flash data center
150417 arc flash data center150417 arc flash data center
150417 arc flash data center
 
Critical care class
Critical care classCritical care class
Critical care class
 
Volunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And PhilanthropyVolunteerism, Social Entrepreneurship And Philanthropy
Volunteerism, Social Entrepreneurship And Philanthropy
 
Introduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for instituesIntroduction to Moodle, myths and truths, perspectives for institues
Introduction to Moodle, myths and truths, perspectives for institues
 
iso 22000
 iso 22000 iso 22000
iso 22000
 
Susiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.docSusiebrishaber hw420-01-unit5ppexercise.doc
Susiebrishaber hw420-01-unit5ppexercise.doc
 
Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013Etude SNCD - Marketing Mobile Attitude - MMA 2013
Etude SNCD - Marketing Mobile Attitude - MMA 2013
 
Heavy Equipments
Heavy EquipmentsHeavy Equipments
Heavy Equipments
 

Similar to Sw prezen3pdf

Similar to Sw prezen3pdf (20)

Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
ENCRYPTION.pptx
ENCRYPTION.pptxENCRYPTION.pptx
ENCRYPTION.pptx
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
PresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdfPresentationonCRYPTOGRAPHYppt.pdf
PresentationonCRYPTOGRAPHYppt.pdf
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
10 system.security.cryptography
10 system.security.cryptography10 system.security.cryptography
10 system.security.cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Sw prezen3pdf

  • 1. Introduction of the Encryption ● We have a lot of information that we don't want other users to see. For example the following things. ● Credit card information ● Private correspondence ● Personal details data ● Bank account information ● Etc.
  • 2. Encryption Systems to security Encryption has been a long time in various ways. Encryption is used especially for military purposes. Encryption has been created by combining the number and text. Today, the encryption more well known as algorithms.
  • 3. Symmetric key encryption Symmetric key encryption is thing that encrypt and decrypt the same to use the key cryptography. Each computer has a secret key in symmetric key encryption
  • 4. Public key cryptosystem Public key encryption is a method to expose the encryption key for encrypted using separate keys for encryption and decryption.
  • 5. TLS(Transport Layer Security) Transport Layer Security is a protocol that required security for communication. This protocol often has called SSL(Secure Sockets Layer frequently).The SSL encryption provides the ability authentication and tamper detection.
  • 6. Hash function The key of public key encryption is based on a hash value. It is a value that is computed from a base input number using a hashing function. Hash functions are incorporated into the hash algorithm. Hash function is used to detect tampering and processing speed of the search speed and data comparison.