SlideShare a Scribd company logo
How Encryption Works
  1.Introduction to How Encryption Works
  When we use it Internet, we read such a news peg and blog
article, and it is necessary online, to send information of
another person of our own with a lot of at the time of - us
who I always just click it here and there, and do not take the
information passively. The information security is offered on in
a computer and the Internet by various methods. I am simple,
but a method of simple security is that an upper confidential
information maintains it.
2.Security Encryption Systems

  When you search for a Web page on the Internet, your reques
is routed though your ISP to the Web. After making a series of
stops along the way at machines that help find the page you're
looking for, your machine is connected to the computer that
serves the Web page you requested. When you search for a
Web page using high-speed dial-up, your request is sent from
the dial-up modem in your computer to the ISP's acceleration
server. Now the acceleration server is requesting and serving
pages on your behalf.
3. Symmetric Key

  Text and other files that need to remain perfectly intact
during the compression process use lossless compression.
Once they are uncompressed, the files return to their original
state. When these files are uncompressed, they are not exactly
as they were before compression. They have lost some of the
original data in the process. The loss in quality may not be
important to the user when weighed against the increase in
speed gained through the compression process.
4. Public Key Encryption

  When you combat this drag, high-speed dial-up providers
have bundled a pop-up blocker into the software they send to
subscribers. This pop-up blocker is programmed to recognize
those lines of code that spell out the ad parameters. When it
sees those tell-tale lines of code, it rejects the ad's request to
be displayed. What this amounts to is less information being
sent across the phone line to your machine. The less data that
is sent, the faster the load time.
5. SSL and TLS

  It would seem that a clever combination of fairly
straightforward technologies has helped to overcome some of
the speed bumps of dial-up Internet. These advances serve to
prolong the life of dial-up Internet and provide an alternative
for those who are tired of standard dial-up but not quite ready
for the leap to broadband. If these advances continue, dial-up
may be here to stay for quite a while. For more information on
high-speed dial-up and related topics, check out the links on
the next page.
6. Hashing Algorithm
   The key of the public key encryption is based on a hash level.
This is a value calculated from the input number of the base
using hash algorithm. The hash level is an abstract of the
original value basically. Even if the important point about the
hash level does not know the data which are used to make a
hash level, I am that it is almost impossible to derive the
number of the original input.
  The public key coding is much really more complicated, but
it is a basic way of thinking.

More Related Content

Viewers also liked

Week 6 News
Week 6 NewsWeek 6 News
Week 6 News
Peg Achterman
 
ENG2120 How to Write a Profile
ENG2120 How to Write a ProfileENG2120 How to Write a Profile
ENG2120 How to Write a Profile
Jessica Thompson
 
SW2-week12
SW2-week12SW2-week12
SW2-week12
s1190015
 
Sw2
Sw2Sw2
Sw2-week13
Sw2-week13Sw2-week13
Sw2-week13
s1190015
 
Sp wr2
Sp wr2Sp wr2
Sp wr2
s1190015
 
Homer and Homeric Epics
Homer and Homeric EpicsHomer and Homeric Epics
Homer and Homeric Epics
jciaramella
 
Campus Journalism - News Writing
Campus Journalism - News WritingCampus Journalism - News Writing
Campus Journalism - News Writing
Antonio Delgado
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 

Viewers also liked (11)

Week 6 News
Week 6 NewsWeek 6 News
Week 6 News
 
ENG2120 How to Write a Profile
ENG2120 How to Write a ProfileENG2120 How to Write a Profile
ENG2120 How to Write a Profile
 
SW2-week12
SW2-week12SW2-week12
SW2-week12
 
Sw2
Sw2Sw2
Sw2
 
Sw2-week13
Sw2-week13Sw2-week13
Sw2-week13
 
Sp wr2
Sp wr2Sp wr2
Sp wr2
 
Homer and Homeric Epics
Homer and Homeric EpicsHomer and Homeric Epics
Homer and Homeric Epics
 
Campus Journalism - News Writing
Campus Journalism - News WritingCampus Journalism - News Writing
Campus Journalism - News Writing
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to sw-of-12

Week10
Week10Week10
Week10
s1150153
 
week10
week10week10
week10
s1150153
 
cryptography
cryptographycryptography
cryptography
Balaji Ravi
 
s117
s117s117
s117
s1170034
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media
 
Dis#10
Dis#10Dis#10
Dis#10
raimu65
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
morticelocksnational21
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
Vijayanand Yadla
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
James Sutter
 
Chapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thChapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of th
JinElias52
 

Similar to sw-of-12 (16)

Week10
Week10Week10
Week10
 
week10
week10week10
week10
 
cryptography
cryptographycryptography
cryptography
 
s117
s117s117
s117
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Dis#10
Dis#10Dis#10
Dis#10
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Chapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of thChapter 8Secure Transport LayerIn the early days of th
Chapter 8Secure Transport LayerIn the early days of th
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

sw-of-12

  • 1. How Encryption Works 1.Introduction to How Encryption Works When we use it Internet, we read such a news peg and blog article, and it is necessary online, to send information of another person of our own with a lot of at the time of - us who I always just click it here and there, and do not take the information passively. The information security is offered on in a computer and the Internet by various methods. I am simple, but a method of simple security is that an upper confidential information maintains it.
  • 2. 2.Security Encryption Systems When you search for a Web page on the Internet, your reques is routed though your ISP to the Web. After making a series of stops along the way at machines that help find the page you're looking for, your machine is connected to the computer that serves the Web page you requested. When you search for a Web page using high-speed dial-up, your request is sent from the dial-up modem in your computer to the ISP's acceleration server. Now the acceleration server is requesting and serving pages on your behalf.
  • 3. 3. Symmetric Key Text and other files that need to remain perfectly intact during the compression process use lossless compression. Once they are uncompressed, the files return to their original state. When these files are uncompressed, they are not exactly as they were before compression. They have lost some of the original data in the process. The loss in quality may not be important to the user when weighed against the increase in speed gained through the compression process.
  • 4. 4. Public Key Encryption When you combat this drag, high-speed dial-up providers have bundled a pop-up blocker into the software they send to subscribers. This pop-up blocker is programmed to recognize those lines of code that spell out the ad parameters. When it sees those tell-tale lines of code, it rejects the ad's request to be displayed. What this amounts to is less information being sent across the phone line to your machine. The less data that is sent, the faster the load time.
  • 5. 5. SSL and TLS It would seem that a clever combination of fairly straightforward technologies has helped to overcome some of the speed bumps of dial-up Internet. These advances serve to prolong the life of dial-up Internet and provide an alternative for those who are tired of standard dial-up but not quite ready for the leap to broadband. If these advances continue, dial-up may be here to stay for quite a while. For more information on high-speed dial-up and related topics, check out the links on the next page.
  • 6. 6. Hashing Algorithm The key of the public key encryption is based on a hash level. This is a value calculated from the input number of the base using hash algorithm. The hash level is an abstract of the original value basically. Even if the important point about the hash level does not know the data which are used to make a hash level, I am that it is almost impossible to derive the number of the original input. The public key coding is much really more complicated, but it is a basic way of thinking.