Encryption
 The Encryption Works
Security Encryption Systems



The computer think people save security. The humans have
wanted to keep information secret.The Greeks made specific
codes that involve substitutions or transpositions of letters and
numbers. The computers are using it.
Symmetric Key




 Spartan generals sending messages is send to each other,
computers using symmetric-key encryption to send information
between each other must have the same key.Symmetric-key
encryption is a secret code that each of the two computers
must know to decode the information. The code provides the
key to decoding the message.
Public Key Encryption


public-key encryption uses two different keys at once. a private
key and a public key. The private key is known only to your
computer, while the public key is given by your computer to any
computer that wants to communicate securely. To decode an
message, a computer must use the public key, provided by the
originating computer, and its own private key.
SSL and TLS




The popular implementation of public-key encryption is the
Secure Sockets Layer (SSL). SSL has become part of an
overall security protocol is Transport Layer Security (TLS). TLS
and its predecessor SSL make use of certificate authorities.
Once your browser requests a secure page and adds "http,".
The browser sends out the public key and checking.
Hashing Algorithm



The key in public-key encryption is made a hash value. This is
a value that is computed from a base input number algorithm.
The hash value is a summary of the original value. The
important thing about a hash value is that it is nearly
impossible. Original input number used to create the hash
value.

SW Week12

  • 1.
  • 2.
    Security Encryption Systems Thecomputer think people save security. The humans have wanted to keep information secret.The Greeks made specific codes that involve substitutions or transpositions of letters and numbers. The computers are using it.
  • 3.
    Symmetric Key Spartangenerals sending messages is send to each other, computers using symmetric-key encryption to send information between each other must have the same key.Symmetric-key encryption is a secret code that each of the two computers must know to decode the information. The code provides the key to decoding the message.
  • 4.
    Public Key Encryption public-keyencryption uses two different keys at once. a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely. To decode an message, a computer must use the public key, provided by the originating computer, and its own private key.
  • 5.
    SSL and TLS Thepopular implementation of public-key encryption is the Secure Sockets Layer (SSL). SSL has become part of an overall security protocol is Transport Layer Security (TLS). TLS and its predecessor SSL make use of certificate authorities. Once your browser requests a secure page and adds "http,". The browser sends out the public key and checking.
  • 6.
    Hashing Algorithm The keyin public-key encryption is made a hash value. This is a value that is computed from a base input number algorithm. The hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible. Original input number used to create the hash value.