The Internet became indispensable to our
life. We do shopping on a net with a credit
card. We do the transfer to the bank account
on a net. Those information does not want to
be known. Therefore we save it to mediums
such as the flash memory. the most popular
forms of security all rely on encryption, the
process of encoding information in such a
way that only the person with the key can
decode it.
Computer encryption is based on the
science of cryptography, which has been used
as long as humans have wanted to keep
information secret. For example the Greek
made a code with a specific cord including the
substitution of the letter and number or the
transposition. Most forms of cryptography in
use these days rely on computers, simply
because a human-based code is too easy for a
computer to crack.
A key, on the other hand, helps a person or
computer figure out the one possibility on a
given occasion. Computers using symmetric-
key encryption to send information between
each other must have the same key.
Symmetric-key encryption is essentially the
same as a secret code that each of the two
computers must know in order to decode the
information. The code provides the key to
decoding the message.
known as asymmetric-key encryption,
public-key encryption uses two different keys
at once -- a combination of a private key and a
public key. The sending computer encrypts the
document with a symmetric key, then encrypts
the symmetric key with the public key of the
receiving computer. The receiving computer
uses its private key to decode the symmetric
key. It then uses the symmetric key to decode
the document.
The key to public key encryption is based
on hash value. This is value calculated from a
base input number using algorithm performing
a hash. The hash value is a summary of the first
value basically. The important thing about the
hash value is that it is almost impossible to
draw an original input number without knowing
the data which are used to make hash value.
A popular implementation of public-key
encryption is the Secure Sockets Layer (SSL).
Originally developed by Netscape, SSL is an
Internet security protocol used by Internet
browsers and Web servers to transmit sensitive
information. SSL has become part of an overall
security protocol known as Transport Layer
Security (TLS).

S&Wweek12

  • 1.
    The Internet becameindispensable to our life. We do shopping on a net with a credit card. We do the transfer to the bank account on a net. Those information does not want to be known. Therefore we save it to mediums such as the flash memory. the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person with the key can decode it.
  • 2.
    Computer encryption isbased on the science of cryptography, which has been used as long as humans have wanted to keep information secret. For example the Greek made a code with a specific cord including the substitution of the letter and number or the transposition. Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack.
  • 3.
    A key, onthe other hand, helps a person or computer figure out the one possibility on a given occasion. Computers using symmetric- key encryption to send information between each other must have the same key. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4.
    known as asymmetric-keyencryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The sending computer encrypts the document with a symmetric key, then encrypts the symmetric key with the public key of the receiving computer. The receiving computer uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document.
  • 5.
    The key topublic key encryption is based on hash value. This is value calculated from a base input number using algorithm performing a hash. The hash value is a summary of the first value basically. The important thing about the hash value is that it is almost impossible to draw an original input number without knowing the data which are used to make hash value.
  • 6.
    A popular implementationof public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).