SlideShare a Scribd company logo
How Encryption for String Security Works ・ VPN ・ Data encryption ・ Router ・ Advanced Encryption
VPN A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
Data encryption The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor.
Router Routers distribute digital information that is contained within a data packet. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network type to another.
Advanced Encryption In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively.
Reference Wikipedia http://en.wikipedia.org/

More Related Content

What's hot

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
Haruki0428
 
How encryption works
How encryption worksHow encryption works
How encryption works
aizu_u-11911
 
presenw13
presenw13presenw13
presenw13
guest179b94
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
 
Week12 b
Week12 bWeek12 b
Week12 b
Takuma Abe
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
n|u - The Open Security Community
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
Manish Tiwari
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Week13
Week13Week13
Week13
GroupB
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
s1190091
 
Week13
Week13Week13
Week13
s1160141
 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
MLG College of Learning, Inc
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
Sejahtera Affif
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
Ulf Mattsson
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
Astha Parihar
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
Masato Nozawa
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 

What's hot (18)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
presenw13
presenw13presenw13
presenw13
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Encrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted CloudEncrypted Databases for Untrusted Cloud
Encrypted Databases for Untrusted Cloud
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week13
Week13Week13
Week13
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week13
Week13Week13
Week13
 
Lesson 1- Foundation of Cryptology
Lesson 1- Foundation of CryptologyLesson 1- Foundation of Cryptology
Lesson 1- Foundation of Cryptology
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 

Viewers also liked

Powerpoint presentation
Powerpoint presentationPowerpoint presentation
Powerpoint presentationMargurit
 
Twitter voor #beginners
Twitter voor #beginnersTwitter voor #beginners
Twitter voor #beginners
simongryspeert
 
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª EdiçãoO Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
Joel Pacheco
 
Narby, jeremy kozmicka zmija (dnk i podrijetlo znanja)
Narby, jeremy   kozmicka zmija (dnk i podrijetlo znanja)Narby, jeremy   kozmicka zmija (dnk i podrijetlo znanja)
Narby, jeremy kozmicka zmija (dnk i podrijetlo znanja)
Matija Kojitijevrag
 
Cerita tukang pintu
Cerita tukang pintuCerita tukang pintu
Cerita tukang pintu
Herman Yosef Paryono
 
Knuc internship-form- winter 2015-doc
Knuc internship-form- winter 2015-docKnuc internship-form- winter 2015-doc
Knuc internship-form- winter 2015-doc
KRITYANAND UNESCO CLUB Jamshedpur
 
Pdf about us
Pdf  about usPdf  about us
KNUC Research Publication on Reform Indian Economic Policy
KNUC Research Publication on Reform Indian Economic PolicyKNUC Research Publication on Reform Indian Economic Policy
KNUC Research Publication on Reform Indian Economic Policy
KRITYANAND UNESCO CLUB Jamshedpur
 
7 ingredientai g
7 ingredientai g7 ingredientai g
7 ingredientai g
Audra Steponavičiūtė
 
Out of control: Failure.
Out of control: Failure.Out of control: Failure.
Out of control: Failure.
Jun Hu
 
Mexicanos p5
Mexicanos p5Mexicanos p5
Mexicanos p5
ysabelmedina
 
How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)
New Forest Business Partnership
 
About my blog
About my blogAbout my blog
About my blog
simplyhillery
 

Viewers also liked (14)

Powerpoint presentation
Powerpoint presentationPowerpoint presentation
Powerpoint presentation
 
Twitter voor #beginners
Twitter voor #beginnersTwitter voor #beginners
Twitter voor #beginners
 
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª EdiçãoO Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
 
Narby, jeremy kozmicka zmija (dnk i podrijetlo znanja)
Narby, jeremy   kozmicka zmija (dnk i podrijetlo znanja)Narby, jeremy   kozmicka zmija (dnk i podrijetlo znanja)
Narby, jeremy kozmicka zmija (dnk i podrijetlo znanja)
 
Cerita tukang pintu
Cerita tukang pintuCerita tukang pintu
Cerita tukang pintu
 
Knuc internship-form- winter 2015-doc
Knuc internship-form- winter 2015-docKnuc internship-form- winter 2015-doc
Knuc internship-form- winter 2015-doc
 
Pdf about us
Pdf  about usPdf  about us
Pdf about us
 
KNUC Research Publication on Reform Indian Economic Policy
KNUC Research Publication on Reform Indian Economic PolicyKNUC Research Publication on Reform Indian Economic Policy
KNUC Research Publication on Reform Indian Economic Policy
 
7 ingredientai g
7 ingredientai g7 ingredientai g
7 ingredientai g
 
Vek.od.ua Публичные выступления Войтко
Vek.od.ua Публичные выступления ВойткоVek.od.ua Публичные выступления Войтко
Vek.od.ua Публичные выступления Войтко
 
Out of control: Failure.
Out of control: Failure.Out of control: Failure.
Out of control: Failure.
 
Mexicanos p5
Mexicanos p5Mexicanos p5
Mexicanos p5
 
How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)
 
About my blog
About my blogAbout my blog
About my blog
 

Similar to Week13

LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1
Amanda2345
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Amirul Wiramuda
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
ijsrd.com
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Hardik Manocha
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
ShrikantSharma86
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
EECJOURNAL
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
Ayanda Demilade
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
Information Technology
 
Week13presen
Week13presenWeek13presen
Week13presen
s1160131
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
SathrukaSinha
 
Network security
Network securityNetwork security
Network security
Ravikumar Natarajan
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Dharani675311
 
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docxReply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
audeleypearl
 

Similar to Week13 (20)

LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Review on variants of Security aware AODV
Review on variants of Security aware AODVReview on variants of Security aware AODV
Review on variants of Security aware AODV
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
B03302007012
B03302007012B03302007012
B03302007012
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 
Week13presen
Week13presenWeek13presen
Week13presen
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
AES Abstract
AES AbstractAES Abstract
AES Abstract
 
Network security
Network securityNetwork security
Network security
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docxReply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
 

Week13

  • 1. How Encryption for String Security Works ・ VPN ・ Data encryption ・ Router ・ Advanced Encryption
  • 2. VPN A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
  • 3. Data encryption The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor.
  • 4. Router Routers distribute digital information that is contained within a data packet. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network type to another.
  • 5. Advanced Encryption In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively.