SlideShare a Scribd company logo
Introduction to How Encryption Works When we use the Internet, for example, reading news articles or blog posts, we take in information actively. Not only these opened information, but also closed information we need, for example, Credit-card information, Social Security numbers, Private correspondence, Personal details, Sensitive company information and so on. These information security is provided on computers and over the Internet by a variety of methods.
Security Encryption Systems Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes. As algorithms, ciphers are better know today, which are the guides for encryption. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion.
Symmetric Key In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
Public Key Encryption One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. In November 1976, the journal IEEE Transactions on Information Theory published a paper which title is “New Directions in Cryptography”, addressed this problem and offered up a solution: public-key encryption.
SSL and TLS  A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
Hashing Algorithm The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value. As a simple example, Input number is 10,667, Hashing algorithm is Input # x 143, Hash value is 1,525381.

More Related Content

What's hot

$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
Hideyuki Sato
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1200019
 
Sp W12
Sp W12Sp W12
Sp W12
Susumu Ito
 
Week12
Week12Week12
Week12
s1180021
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
I M
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
S1715
 
Kadai1
Kadai1Kadai1
Kadai1
s1190105
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
 
How encryption works
How encryption worksHow encryption works
How encryption works
aizu_u-11911
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
CheapSSLsecurity
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 

What's hot (15)

$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Encryption
EncryptionEncryption
Encryption
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Sp W12
Sp W12Sp W12
Sp W12
 
Week12
Week12Week12
Week12
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Kadai1
Kadai1Kadai1
Kadai1
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
How encryption works
How encryption worksHow encryption works
How encryption works
 

Similar to Week12 b

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Week12
Week12Week12
Week12
Ma310Shi
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
ravin349878
 
Encryption
EncryptionEncryption
Encryption
Masato Nozawa
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
Masato Nozawa
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
Faith Nweke
 
week 12
week 12week 12
week 12
s1200008
 
Week12
Week12Week12
Week12
s1180021
 
Week12
Week12Week12
Week12
s1180021
 
Week12
Week12Week12
Week12
s1180181
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
How encryption works
How encryption worksHow encryption works
How encryption works
RaxTonProduction
 
無題 1
無題 1無題 1
無題 1
stella12345
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
Cryptointro
CryptointroCryptointro
Cryptointro
losalamos
 

Similar to Week12 b (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
week 12
week 12week 12
week 12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
無題 1
無題 1無題 1
無題 1
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Cryptointro
CryptointroCryptointro
Cryptointro
 

Week12 b

  • 1. Introduction to How Encryption Works When we use the Internet, for example, reading news articles or blog posts, we take in information actively. Not only these opened information, but also closed information we need, for example, Credit-card information, Social Security numbers, Private correspondence, Personal details, Sensitive company information and so on. These information security is provided on computers and over the Internet by a variety of methods.
  • 2. Security Encryption Systems Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes. As algorithms, ciphers are better know today, which are the guides for encryption. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion.
  • 3. Symmetric Key In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. Public Key Encryption One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. In November 1976, the journal IEEE Transactions on Information Theory published a paper which title is “New Directions in Cryptography”, addressed this problem and offered up a solution: public-key encryption.
  • 5. SSL and TLS A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 6. Hashing Algorithm The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value. As a simple example, Input number is 10,667, Hashing algorithm is Input # x 143, Hash value is 1,525381.