SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption Works

Introduction to How Encryption Works
Security Encryption Systems
Symmetric Key

Public Key Encryption
SSL and TLS
Introduction to How Encryption
             Works
When we use the Internet, we're not always just
clicking around and passively taking in
information, such as reading news articles or
blog posts -- a great deal of our time online
involves sending others our own information.
Ordering something over the Internet, whether
it's a book, a CD or anything else from an online
vendor, or signing up for an online account,
requires entering in a good deal of sensitive
personal information.
Security Encryption Systems


The Greek historian Plutarch wrote, for example,
about Spartan generals who sent and received
sensitive messages using a scytale, a thin
cylinder made out of wood. The general would
wrap a piece of parchment around the scytale and
write his message along its length.
Symmetric Key

 Each computer has a secret key that it can use to
encrypt a packet of information before it is sent
over the network to another computer.
Symmetric-key requires that you know which
computers will be talking to each other so you
can install the key on each one. Symmetric-key
encryption is essentially the same as a secret
code that each of the two computers must know
in order to decode the information. The code
provides the key to decoding the message.
Public Key Encryption

asymmetric-key encryption, public-key
encryption uses two different keys at once -- a
combination of a private key and a public key.
The private key is known only to your computer,
while the public key is given by your computer
to any computer that wants to communicate
securely with it. To decode an encrypted
message, a computer must use the public key,
provided by the originating computer, and its
own private key.
SSL and TLS

 You will notice that the "http" in the address line
is replaced with "https," and you should see a
small padlock in the status bar at the bottom of
the browser window. When you're accessing
sensitive information, such as an online bank
account or a payment transfer service like PayPal
or Google Checkout, chances are you'll see this
type of format change and know your
information will most likely pass along securely.

More Related Content

What's hot

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Workss1170054
 
Cryptography (raza hassan)
Cryptography (raza hassan)Cryptography (raza hassan)
Cryptography (raza hassan)Raza Hassan
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptographyAshish Kumar
 

What's hot (6)

Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Ss
SsSs
Ss
 
Cryptography (raza hassan)
Cryptography (raza hassan)Cryptography (raza hassan)
Cryptography (raza hassan)
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
Sp W12
Sp W12Sp W12
Sp W12
 

Viewers also liked

Viewers also liked (20)

Power Point 2008 Generic
Power Point 2008 GenericPower Point 2008 Generic
Power Point 2008 Generic
 
ΒΟΥΔΙΣΜΟΣ Οκταπλό μονοπάτι για τη Νιρβάνα
ΒΟΥΔΙΣΜΟΣ Οκταπλό μονοπάτι για τη ΝιρβάναΒΟΥΔΙΣΜΟΣ Οκταπλό μονοπάτι για τη Νιρβάνα
ΒΟΥΔΙΣΜΟΣ Οκταπλό μονοπάτι για τη Νιρβάνα
 
Presentasjon Mappeoppg 3
Presentasjon Mappeoppg 3Presentasjon Mappeoppg 3
Presentasjon Mappeoppg 3
 
dolce bangladese
dolce bangladesedolce bangladese
dolce bangladese
 
Milana project 2
Milana project 2Milana project 2
Milana project 2
 
Dd medios sesion1_parte1
Dd medios sesion1_parte1Dd medios sesion1_parte1
Dd medios sesion1_parte1
 
Capitulo 13
Capitulo 13Capitulo 13
Capitulo 13
 
Les nostres cançons
Les nostres cançonsLes nostres cançons
Les nostres cançons
 
Capitulo 18
Capitulo 18Capitulo 18
Capitulo 18
 
Capitulo 13
Capitulo 13Capitulo 13
Capitulo 13
 
Power
PowerPower
Power
 
S r auditiva
S r auditivaS r auditiva
S r auditiva
 
Alto falantes qual a melhor ligação
Alto falantes qual a melhor ligaçãoAlto falantes qual a melhor ligação
Alto falantes qual a melhor ligação
 
Tic y su apropiacion pedagógica. silva natalia. 3er año.
Tic y su apropiacion pedagógica. silva natalia. 3er año.Tic y su apropiacion pedagógica. silva natalia. 3er año.
Tic y su apropiacion pedagógica. silva natalia. 3er año.
 
Què és una tona
Què és una tonaQuè és una tona
Què és una tona
 
2014 igda @ gdc sponsorship opportunities
2014 igda @ gdc sponsorship opportunities2014 igda @ gdc sponsorship opportunities
2014 igda @ gdc sponsorship opportunities
 
야상곡(김윤아)Tab
야상곡(김윤아)Tab야상곡(김윤아)Tab
야상곡(김윤아)Tab
 
Power ètica
Power èticaPower ètica
Power ètica
 
Presentación proyecto
Presentación proyectoPresentación proyecto
Presentación proyecto
 
Evangelio II Domingo de Adviento
Evangelio II Domingo de AdvientoEvangelio II Domingo de Adviento
Evangelio II Domingo de Adviento
 

Similar to Sw2 week12 (20)

Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Week12
Week12Week12
Week12
 
Ss
SsSs
Ss
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Week12
Week12Week12
Week12
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Encryption
EncryptionEncryption
Encryption
 

More from Shouta Yoshida (19)

Week13 b
Week13 bWeek13 b
Week13 b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
How rss works
How rss worksHow rss works
How rss works
 
How rss works
How rss worksHow rss works
How rss works
 
Week11 b
Week11 bWeek11 b
Week11 b
 
How rss works
How rss worksHow rss works
How rss works
 
Week11 b
Week11 bWeek11 b
Week11 b
 
How rss works
How rss worksHow rss works
How rss works
 
Week11 b
Week11 bWeek11 b
Week11 b
 
How rss works
How rss worksHow rss works
How rss works
 
How rss works
How rss worksHow rss works
How rss works
 
Sw week10 part1 b-1
Sw week10 part1 b-1Sw week10 part1 b-1
Sw week10 part1 b-1
 
Week11 b
Week11 bWeek11 b
Week11 b
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation2
Presentation2Presentation2
Presentation2
 
S1190027 shouta yoshida
S1190027 shouta yoshidaS1190027 shouta yoshida
S1190027 shouta yoshida
 
Sw week10 part1 b-1
Sw week10 part1 b-1Sw week10 part1 b-1
Sw week10 part1 b-1
 
sw week10 part1-B.odp
sw week10 part1-B.odp	sw week10 part1-B.odp
sw week10 part1-B.odp
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Sw2 week12

  • 1. How Encryption Works Introduction to How Encryption Works Security Encryption Systems Symmetric Key Public Key Encryption SSL and TLS
  • 2. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 3. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length.
  • 4. Symmetric Key Each computer has a secret key that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. Public Key Encryption asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
  • 6. SSL and TLS You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.