SlideShare a Scribd company logo
How Encryption for Strong Security Works


 ・ PSTN   Multi-Function Cipher Machine
・ Virtual private network (VPN)
・ SSL (Secure Sockets Layer)
・ RSA
PSTN Multi-Function Cipher Machine
 PSTN multi-function cipher machine enable the encryption and protection
service of important call, fax and point-to-point data communication via public
and/or private telephone network, to ensure the safety of transmission over lines,
thereby effectively preventing leak loss from the transmission lines of sensitive
information. PSTN multi-function cipher machine consists of general purpose key
management device, Key Distribution Center and cipher machine. Two ways
(online and offline) of key management are supported, general purpose key
management device creates key, and distributes cipher algorithm and key offline;
the key distribution center/console is able to distribute key online.
Virtual private network (VPN)
  A virtual private network (VPN) is a computer
  network that uses a public telecommunication
   infrastructure such as the Internet to provide
  remote offices or individual users with secure
access to their organization's network. It aims to
 avoid an expensive system of owned or leased
lines that can be used by only one organization.
SSL (Secure Sockets Layer)
●   SSL (Secure Sockets Layer) is the standard
    security technology for establishing an
    encrypted link between a web server and a
    browser.
RSA
●   RSA(which stands for Rivest, Shamir and
    Adleman who first publicly described it) is an
    Internet encryption and authentication system
    that uses an algorithm developed in 1977.
Reference
●   Westone Corporation
    http://www.westone.com.cn/english/view31.htm
●   Internet Encryption
    http://www.cohn-family.com/encryption.htm
●   searchsecurity.com
    http://searchsecurity.techtarget.com/sDefinition/
    0,,sid14_gci214273,00.html
●   SSL.com
    http://info.ssl.com/article.aspx?id=10241

More Related Content

What's hot

Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
Adri Jovin
 
Week13presen
Week13presenWeek13presen
Week13presen
s1160131
 
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Maurice Dawson
 
Roof safety cpd leaflet
Roof safety cpd leafletRoof safety cpd leaflet
Roof safety cpd leaflet
Marie Wilson
 
RSA algorithem
RSA algorithemRSA algorithem
RSA algorithem
Taslima Yasmin Tarin
 
Sirius for business
Sirius for business Sirius for business
Sirius for business
Mandy Collings
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
yuki0722_0007
 
Making Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUMMaking Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUM
Kongossa (KWS)
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
Ashish Kumar
 
How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...
Richard Tubb
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
jamesbarns729
 
Iron Key Introduction
Iron Key IntroductionIron Key Introduction
Iron Key Introduction
John Jefferies
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 

What's hot (18)

Network Security
Network SecurityNetwork Security
Network Security
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
 
Week13 Presen
Week13 PresenWeek13 Presen
Week13 Presen
 
Week11
Week11Week11
Week11
 
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
 
Roof safety cpd leaflet
Roof safety cpd leafletRoof safety cpd leaflet
Roof safety cpd leaflet
 
RSA algorithem
RSA algorithemRSA algorithem
RSA algorithem
 
Sirius for business
Sirius for business Sirius for business
Sirius for business
 
Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
Making Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUMMaking Parivacy Accessible to Non profit | KWS FORUM
Making Parivacy Accessible to Non profit | KWS FORUM
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...How to transition from selling security products to selling profitable securi...
How to transition from selling security products to selling profitable securi...
 
Ssl certificate in internet world
Ssl certificate in internet worldSsl certificate in internet world
Ssl certificate in internet world
 
Iron Key Introduction
Iron Key IntroductionIron Key Introduction
Iron Key Introduction
 
Web Presen
Web PresenWeb Presen
Web Presen
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 

Viewers also liked

MarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideMarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideRanganath Shivaram
 
Preview lunch presentation
Preview lunch presentationPreview lunch presentation
Preview lunch presentationgduerson
 
Library Management Software
Library Management SoftwareLibrary Management Software
Library Management Software
Ranganath Shivaram
 
Regolamento supplenze al personale docente
Regolamento supplenze al personale docenteRegolamento supplenze al personale docente
Regolamento supplenze al personale docente
Fis-Cab FLP Scuola
 
VYETV - (ja-JP)
VYETV - (ja-JP)VYETV - (ja-JP)
VYETV - (ja-JP)
Sho Shimoda
 
Presenza docenti
Presenza docentiPresenza docenti
Presenza docenti
Fis-Cab FLP Scuola
 
MarvelSoft School Management Software
MarvelSoft School Management SoftwareMarvelSoft School Management Software
MarvelSoft School Management SoftwareRanganath Shivaram
 
Pakistans marketaccessinitiative humairaziamufti
Pakistans marketaccessinitiative humairaziamuftiPakistans marketaccessinitiative humairaziamufti
Pakistans marketaccessinitiative humairaziamuftinaseer89
 
Free Fees Collection software
Free Fees Collection softwareFree Fees Collection software
Free Fees Collection software
Ranganath Shivaram
 
VYETV (en-WD)
VYETV (en-WD)VYETV (en-WD)
VYETV (en-WD)
Sho Shimoda
 
M correlation 1
M correlation 1M correlation 1
M correlation 1
Sho Shimoda
 
School admin fees collection software
School admin fees collection softwareSchool admin fees collection software
School admin fees collection software
Ranganath Shivaram
 
MarvelSoft Bangalore, Company Profile
MarvelSoft Bangalore, Company ProfileMarvelSoft Bangalore, Company Profile
MarvelSoft Bangalore, Company Profile
Ranganath Shivaram
 
PayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP SoftwarePayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP Software
Ranganath Shivaram
 
SchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting SoftwareSchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting Software
Ranganath Shivaram
 

Viewers also liked (16)

MarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guideMarvelSoft SchoolAdmin school software lan setup guide
MarvelSoft SchoolAdmin school software lan setup guide
 
Preview lunch presentation
Preview lunch presentationPreview lunch presentation
Preview lunch presentation
 
Library Management Software
Library Management SoftwareLibrary Management Software
Library Management Software
 
Regolamento supplenze al personale docente
Regolamento supplenze al personale docenteRegolamento supplenze al personale docente
Regolamento supplenze al personale docente
 
VYETV - (ja-JP)
VYETV - (ja-JP)VYETV - (ja-JP)
VYETV - (ja-JP)
 
Presenza docenti
Presenza docentiPresenza docenti
Presenza docenti
 
MarvelSoft School Management Software
MarvelSoft School Management SoftwareMarvelSoft School Management Software
MarvelSoft School Management Software
 
Final Project
Final ProjectFinal Project
Final Project
 
Pakistans marketaccessinitiative humairaziamufti
Pakistans marketaccessinitiative humairaziamuftiPakistans marketaccessinitiative humairaziamufti
Pakistans marketaccessinitiative humairaziamufti
 
Free Fees Collection software
Free Fees Collection softwareFree Fees Collection software
Free Fees Collection software
 
VYETV (en-WD)
VYETV (en-WD)VYETV (en-WD)
VYETV (en-WD)
 
M correlation 1
M correlation 1M correlation 1
M correlation 1
 
School admin fees collection software
School admin fees collection softwareSchool admin fees collection software
School admin fees collection software
 
MarvelSoft Bangalore, Company Profile
MarvelSoft Bangalore, Company ProfileMarvelSoft Bangalore, Company Profile
MarvelSoft Bangalore, Company Profile
 
PayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP SoftwarePayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP Software
 
SchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting SoftwareSchoolAdmin - School Fees Collection & Accounting Software
SchoolAdmin - School Fees Collection & Accounting Software
 

Similar to Week13 presentation

college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
Amazon Web Services
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
HNDE Labuduwa Galle
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
eyad alaa
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
iplotnikov
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryJohan Dentant
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
Rana assad ali
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
cnnetwork
 
Web security
Web securityWeb security
Web securityLayla Tk
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
Network security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptxNetwork security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptx
ahsanAli918806
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 

Similar to Week13 presentation (20)

Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Web Security
Web SecurityWeb Security
Web Security
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Network security
Network securityNetwork security
Network security
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_Industry
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
Web security
Web securityWeb security
Web security
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Network security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptxNetwork security Slides fir bs-13.PPT.pptx
Network security Slides fir bs-13.PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Week13 presentation

  • 1. How Encryption for Strong Security Works  ・ PSTN Multi-Function Cipher Machine ・ Virtual private network (VPN) ・ SSL (Secure Sockets Layer) ・ RSA
  • 2. PSTN Multi-Function Cipher Machine PSTN multi-function cipher machine enable the encryption and protection service of important call, fax and point-to-point data communication via public and/or private telephone network, to ensure the safety of transmission over lines, thereby effectively preventing leak loss from the transmission lines of sensitive information. PSTN multi-function cipher machine consists of general purpose key management device, Key Distribution Center and cipher machine. Two ways (online and offline) of key management are supported, general purpose key management device creates key, and distributes cipher algorithm and key offline; the key distribution center/console is able to distribute key online.
  • 3. Virtual private network (VPN) A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
  • 4. SSL (Secure Sockets Layer) ● SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser.
  • 5. RSA ● RSA(which stands for Rivest, Shamir and Adleman who first publicly described it) is an Internet encryption and authentication system that uses an algorithm developed in 1977.
  • 6. Reference ● Westone Corporation http://www.westone.com.cn/english/view31.htm ● Internet Encryption http://www.cohn-family.com/encryption.htm ● searchsecurity.com http://searchsecurity.techtarget.com/sDefinition/ 0,,sid14_gci214273,00.html ● SSL.com http://info.ssl.com/article.aspx?id=10241