SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption For Strong Security
              Works
●   Pseudoramdom Noise
●   Data Encryption
●   Link Encryption
●   VPN

                           s1170132 Manamu Abe
                         s1170133 Keigo Amma
                       s1170144 Ryo Kanno
                      s1170145 Masataka Kubota
Pseudoramdom Noise
●   In cryptography,
    pseudorandom noise
    (PRN) is signal similar
    to noise which satisfies
    one or more of the
    standard test for
    statistical randomness.
Data Encryption
●   Data encryption
    is a process in
    which plaintext
    data is
    converted into
    ciphertext so
    that it cannot be
    read.
Link Encryption
●   Link encryption is the
    data security process
    of encrypting
    information at the
    data link level as it is
    transmitted between
    two points within a
    network.
VPN
●VPN(Virtual Private
Network) is service to
connect data
communications
between systems.

●
  We can use public
lines like common
carrier leased lines with
VPN
REFERENCE
 Pseuderandom                     Noise
 http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache
 http://en.wikipedia.org/wiki/Pseudorandom_noise


 Data      Encryption
 http://www.wisegeek.com/what-is-data-encryption.htm
 http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm


 Link     Encryption
 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html
 http://www.palowireless.com/bluearticles/cc1_security1.asp


 VPN
 http://en.wikipedia.org/wiki/Vpn
  http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0

More Related Content

What's hot

Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Muhammad Farooq Hussain
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffersWanwen Wen
 

What's hot (15)

Poster-A4
Poster-A4Poster-A4
Poster-A4
 
Cryptography
Cryptography Cryptography
Cryptography
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Kadai
KadaiKadai
Kadai
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Ss
SsSs
Ss
 

Viewers also liked

Viewers also liked (20)

Yacht charters
Yacht chartersYacht charters
Yacht charters
 
Ssiivu1
Ssiivu1Ssiivu1
Ssiivu1
 
Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009
 
Accenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_reportAccenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_report
 
竺宇峰
竺宇峰竺宇峰
竺宇峰
 
Magico
MagicoMagico
Magico
 
SheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption InfographicSheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption Infographic
 
Savethedate3
Savethedate3Savethedate3
Savethedate3
 
Earth Science Jeopardy
Earth Science JeopardyEarth Science Jeopardy
Earth Science Jeopardy
 
Jupiterimages Catalog
Jupiterimages CatalogJupiterimages Catalog
Jupiterimages Catalog
 
Karina
KarinaKarina
Karina
 
Atlanta Briefing Part 1
Atlanta Briefing Part 1Atlanta Briefing Part 1
Atlanta Briefing Part 1
 
Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009
 
Good Advice
Good AdviceGood Advice
Good Advice
 
International Trade And Business
International Trade And BusinessInternational Trade And Business
International Trade And Business
 
Lizeth And Jenny`S Project
Lizeth And Jenny`S ProjectLizeth And Jenny`S Project
Lizeth And Jenny`S Project
 
MANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORASMANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORAS
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Learningapps2
Learningapps2Learningapps2
Learningapps2
 
1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health 1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health
 

Similar to How Encryption Works for Strong Security

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Week13presen
Week13presenWeek13presen
Week13presens1160131
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 

Similar to How Encryption Works for Strong Security (20)

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Security F
Security FSecurity F
Security F
 
Group3
Group3Group3
Group3
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Ga13
Ga13Ga13
Ga13
 
Week13
Week13Week13
Week13
 
English2
English2English2
English2
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn
Vpn Vpn
Vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Week13
Week13Week13
Week13
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 

More from tykl94

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)tykl94
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationtykl94
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2tykl94
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2tykl94
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1tykl94
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3tykl94
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1tykl94
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5tykl94
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4tykl94
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3tykl94
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2tykl94
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1tykl94
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4tykl94
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3tykl94
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1tykl94
 
Week7 1m
Week7 1mWeek7 1m
Week7 1mtykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1tykl94
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignmenttykl94
 

More from tykl94 (20)

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentation
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1
 
Week7 1m
Week7 1mWeek7 1m
Week7 1m
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignment
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

How Encryption Works for Strong Security

  • 1. How Encryption For Strong Security Works ● Pseudoramdom Noise ● Data Encryption ● Link Encryption ● VPN s1170132 Manamu Abe s1170133 Keigo Amma s1170144 Ryo Kanno s1170145 Masataka Kubota
  • 2. Pseudoramdom Noise ● In cryptography, pseudorandom noise (PRN) is signal similar to noise which satisfies one or more of the standard test for statistical randomness.
  • 3. Data Encryption ● Data encryption is a process in which plaintext data is converted into ciphertext so that it cannot be read.
  • 4. Link Encryption ● Link encryption is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.
  • 5. VPN ●VPN(Virtual Private Network) is service to connect data communications between systems. ● We can use public lines like common carrier leased lines with VPN
  • 6. REFERENCE  Pseuderandom Noise http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache http://en.wikipedia.org/wiki/Pseudorandom_noise  Data Encryption http://www.wisegeek.com/what-is-data-encryption.htm http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm  Link Encryption http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html http://www.palowireless.com/bluearticles/cc1_security1.asp  VPN http://en.wikipedia.org/wiki/Vpn http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0