SlideShare a Scribd company logo
It has become possible to use internet when we are at home or in our office in recent

years. When we use internet, we get a lot of information and send our personal data such

as our secret password and Email addresses. If the protocol was a one-to-one information

exchange, there is possibility that the information is tapped by the outsider. Once our

personal data is leaked, there is no end to the loss. For this reason, we

have to hide our data protocol. However, if we hide the data

completely and refrain from sending it, we may not use internet

forever. Therefore, data coding system which outsider can’t see the

true data stream has been needed. This is what we call Encryption.
Encryption is important for data exchange which use computer, but the main idea has already exist
 since the time when computers were not popular. Scytale is a good example. This is a thin cylinder
 made out of wood. The use of this tool is…
                                                              Scytale
1.   Wrap a piece of parchment around the scytale.
2.   Write his message along its length.
3.   Removed the paper from the cylinder.
4.   Wrap the paper around other cylinder.



            In case of same size cylinder
         You can read sender’s massage


          In case of different size cylinder
         You will read meaningless enumeration of alphabet
If you send a message “JGNNQ” to your friend, both he and outsider can’t understand its mean.
However, if your friend has already known how to code your message, he can read it. In this case,
“Shift by 2” is a symmetric key.
                                      Shift alphabet by 2




            JGNNQ                                             HELLO

This is a simple example. In fact, the coding key like “Shift by 2” is easy to crack. Therefore,
computers have been adopted more complex coding system. For example, Data Encryption Standard
(DES), approved for use in the 1970s uses a 56-bit key. It offers more than 70 quadrillion possible
combinations. In case of Advanced Encryption Standard (AES), which uses 128-, 192- or 256-bit keys,
it can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations.
I think you would understand the complexity of encryption which uses symmetric key, but it has a
weak point for security aspect. It is sending your Symmetric Key directly before you send your coded
text. At this time, if symmetric key leaked to outsider, the encryption will be a meaningless action
because they know how to solve your coded
message.

Public key encryption clears this problem by
using public key and secret key.

First, you exhibit your public key to sender.
Don't worry. Public key isn't direct clue on
sender's message.

Second, sender makes coded text by using his
secret key which made from your public key.
After that, he sends the text to you.

Finally, you use your secret key and decrypt
text. As a result, Public key encryption system
is safer to exchange data than Symmetric Key
encryption.
Secure Sockets Layer (SSL) is one of the popular tools which help public-key encryption. You might
use it at the scene where you use PayPal or Google Checkout. While you are using SSL, the word
"https" appears browser's address bar like this picture.




     Look at the browser's
     address bar, the word
      "https" is appearing




Then, the browser uses the public key and encrypts data.
Another symbol which appears while you are using SSL/TLS




Transport Layer Security (TLS) is more safe protocol. It has been replaced SSL as a most popular way
to encryption.

More Related Content

What's hot

Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
Shafaan Khaliq Bhatti
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
anusachu .
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
Iaetsd Iaetsd
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Deepti Dohare
 
Cryptography
CryptographyCryptography
Cryptography
Rutuja Solkar
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
ijcsit
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
Milos Dunjic
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
C3 s
C3 sC3 s
Encryption
EncryptionEncryption
Encryption
Vijay Kumar
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
CSCJournals
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
ijsrd.com
 
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
Puneeth Puni
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
csandit
 

What's hot (18)

Authentication: keys, MAC
Authentication: keys, MACAuthentication: keys, MAC
Authentication: keys, MAC
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
Iaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell usingIaetsd a layered security approach through femto cell using
Iaetsd a layered security approach through femto cell using
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
 
Cryptography
CryptographyCryptography
Cryptography
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
C3 s
C3 sC3 s
C3 s
 
Encryption
EncryptionEncryption
Encryption
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
2 IJAERS-JUN-2015-6-RSA and Modified RSA algorithm using C Programming
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
 

Viewers also liked

[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java
[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java
[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java
Than Thi Habidan
 
Week13
Week13Week13
Week13
s1180004
 
The Sky This Week For June 10 to June 19 _ 2016
The Sky This Week For June 10 to June 19 _ 2016The Sky This Week For June 10 to June 19 _ 2016
The Sky This Week For June 10 to June 19 _ 2016
SOCIEDAD JULIO GARAVITO
 
The Sky This Week for June 24 to July 3 2016
The Sky This Week for June 24 to July 3 2016The Sky This Week for June 24 to July 3 2016
The Sky This Week for June 24 to July 3 2016
SOCIEDAD JULIO GARAVITO
 
Mars closest to earth on may 30, 2016
Mars closest to earth on may 30, 2016Mars closest to earth on may 30, 2016
Mars closest to earth on may 30, 2016
SOCIEDAD JULIO GARAVITO
 
Week13
Week13Week13
Week13
s1180004
 
Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...
Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...
Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...
SOCIEDAD JULIO GARAVITO
 
Fall 2010 - final powerpoint -- shared understandings and communities of pra...
Fall 2010  - final powerpoint -- shared understandings and communities of pra...Fall 2010  - final powerpoint -- shared understandings and communities of pra...
Fall 2010 - final powerpoint -- shared understandings and communities of pra...
morganpaddy
 
Girlie
GirlieGirlie
Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015
Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015 Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015
Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015
SOCIEDAD JULIO GARAVITO
 
Longitud dava sobel
Longitud   dava sobelLongitud   dava sobel
Longitud dava sobel
SOCIEDAD JULIO GARAVITO
 
Action comedy
Action comedyAction comedy
Action comedy
Nyaja Covington
 
Apartes de la charla: Resultados del Tránsito de Mercurio en Frente del Sol...
Apartes de la  charla:  Resultados del Tránsito de Mercurio en Frente del Sol...Apartes de la  charla:  Resultados del Tránsito de Mercurio en Frente del Sol...
Apartes de la charla: Resultados del Tránsito de Mercurio en Frente del Sol...
SOCIEDAD JULIO GARAVITO
 
Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...
Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...
Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...
SOCIEDAD JULIO GARAVITO
 
Programación ASASAC Planetario de Bogotá_ Agosto 2016
Programación ASASAC Planetario de Bogotá_ Agosto 2016Programación ASASAC Planetario de Bogotá_ Agosto 2016
Programación ASASAC Planetario de Bogotá_ Agosto 2016
SOCIEDAD JULIO GARAVITO
 

Viewers also liked (15)

[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java
[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java
[Www.indowebster.com] jeni-intro1-bab02-pengenalan bahasa-java
 
Week13
Week13Week13
Week13
 
The Sky This Week For June 10 to June 19 _ 2016
The Sky This Week For June 10 to June 19 _ 2016The Sky This Week For June 10 to June 19 _ 2016
The Sky This Week For June 10 to June 19 _ 2016
 
The Sky This Week for June 24 to July 3 2016
The Sky This Week for June 24 to July 3 2016The Sky This Week for June 24 to July 3 2016
The Sky This Week for June 24 to July 3 2016
 
Mars closest to earth on may 30, 2016
Mars closest to earth on may 30, 2016Mars closest to earth on may 30, 2016
Mars closest to earth on may 30, 2016
 
Week13
Week13Week13
Week13
 
Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...
Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...
Resumen de la Charla: ÉTICA E IDONEIDAD CIENTÍFICA EN CLAIR CAMERON PATTERSON...
 
Fall 2010 - final powerpoint -- shared understandings and communities of pra...
Fall 2010  - final powerpoint -- shared understandings and communities of pra...Fall 2010  - final powerpoint -- shared understandings and communities of pra...
Fall 2010 - final powerpoint -- shared understandings and communities of pra...
 
Girlie
GirlieGirlie
Girlie
 
Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015
Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015 Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015
Alan Stern: What We Found at Pluto By: Alan Stern | July 31, 2015
 
Longitud dava sobel
Longitud   dava sobelLongitud   dava sobel
Longitud dava sobel
 
Action comedy
Action comedyAction comedy
Action comedy
 
Apartes de la charla: Resultados del Tránsito de Mercurio en Frente del Sol...
Apartes de la  charla:  Resultados del Tránsito de Mercurio en Frente del Sol...Apartes de la  charla:  Resultados del Tránsito de Mercurio en Frente del Sol...
Apartes de la charla: Resultados del Tránsito de Mercurio en Frente del Sol...
 
Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...
Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...
Clair C. Patterson (1922-1995) INTERVIEWED BY SHIRLEY K. COHEN March 5, 6 and...
 
Programación ASASAC Planetario de Bogotá_ Agosto 2016
Programación ASASAC Planetario de Bogotá_ Agosto 2016Programación ASASAC Planetario de Bogotá_ Agosto 2016
Programación ASASAC Planetario de Bogotá_ Agosto 2016
 

Similar to Week12

Homework1
Homework1Homework1
Homework1
trd10000
 
無題 1
無題 1無題 1
無題 1
stella12345
 
Network security notes
Network security notesNetwork security notes
Network security notes
netlabacademy
 
Information Security
Information SecurityInformation Security
Information Security
Presentaionslive.blogspot.com
 
Week12
Week12Week12
Week12
Ma310Shi
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
Razorpoint Security
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
jibonjibon5
 
Week12 b
Week12 bWeek12 b
Week12 b
Takuma Abe
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Cryptography
CryptographyCryptography
Cryptography
Milap Oza
 
Week12
Week12Week12
Week12
s1180181
 
Crypto
CryptoCrypto
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
s1190100
 

Similar to Week12 (20)

Homework1
Homework1Homework1
Homework1
 
無題 1
無題 1無題 1
無題 1
 
Network security notes
Network security notesNetwork security notes
Network security notes
 
Information Security
Information SecurityInformation Security
Information Security
 
Week12
Week12Week12
Week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Data encryption
Data encryptionData encryption
Data encryption
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Week12
Week12Week12
Week12
 
Crypto
CryptoCrypto
Crypto
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 

Week12

  • 1.
  • 2. It has become possible to use internet when we are at home or in our office in recent years. When we use internet, we get a lot of information and send our personal data such as our secret password and Email addresses. If the protocol was a one-to-one information exchange, there is possibility that the information is tapped by the outsider. Once our personal data is leaked, there is no end to the loss. For this reason, we have to hide our data protocol. However, if we hide the data completely and refrain from sending it, we may not use internet forever. Therefore, data coding system which outsider can’t see the true data stream has been needed. This is what we call Encryption.
  • 3. Encryption is important for data exchange which use computer, but the main idea has already exist since the time when computers were not popular. Scytale is a good example. This is a thin cylinder made out of wood. The use of this tool is… Scytale 1. Wrap a piece of parchment around the scytale. 2. Write his message along its length. 3. Removed the paper from the cylinder. 4. Wrap the paper around other cylinder. In case of same size cylinder You can read sender’s massage In case of different size cylinder You will read meaningless enumeration of alphabet
  • 4. If you send a message “JGNNQ” to your friend, both he and outsider can’t understand its mean. However, if your friend has already known how to code your message, he can read it. In this case, “Shift by 2” is a symmetric key. Shift alphabet by 2 JGNNQ HELLO This is a simple example. In fact, the coding key like “Shift by 2” is easy to crack. Therefore, computers have been adopted more complex coding system. For example, Data Encryption Standard (DES), approved for use in the 1970s uses a 56-bit key. It offers more than 70 quadrillion possible combinations. In case of Advanced Encryption Standard (AES), which uses 128-, 192- or 256-bit keys, it can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations.
  • 5. I think you would understand the complexity of encryption which uses symmetric key, but it has a weak point for security aspect. It is sending your Symmetric Key directly before you send your coded text. At this time, if symmetric key leaked to outsider, the encryption will be a meaningless action because they know how to solve your coded message. Public key encryption clears this problem by using public key and secret key. First, you exhibit your public key to sender. Don't worry. Public key isn't direct clue on sender's message. Second, sender makes coded text by using his secret key which made from your public key. After that, he sends the text to you. Finally, you use your secret key and decrypt text. As a result, Public key encryption system is safer to exchange data than Symmetric Key encryption.
  • 6. Secure Sockets Layer (SSL) is one of the popular tools which help public-key encryption. You might use it at the scene where you use PayPal or Google Checkout. While you are using SSL, the word "https" appears browser's address bar like this picture. Look at the browser's address bar, the word "https" is appearing Then, the browser uses the public key and encrypts data. Another symbol which appears while you are using SSL/TLS Transport Layer Security (TLS) is more safe protocol. It has been replaced SSL as a most popular way to encryption.