SlideShare a Scribd company logo
1 of 6
Download to read offline
How encryption work
      s1200025 Yosuke Takabatake
               Partner Junya Sato
What's encryption ?
             The information required
             protection that other users attack
             , theft and so on.
             Therefore "encryption" was
             made.
             History of encryption is very old.
             For example, most old encryption
             is that "hieroglyph" in B.C. 19.
             Recently, encryption is most
             important in modern society that
             almost all people use computer,
             mobile device, and other
             electrical devices.
What's encryption ?
             Electrical data copy can very easy
             way. because of , this data finally
             made of 1 or 0. therefore data
             protection want that Data
             Encryption.
             Detail of Data encryption is that
             Our data contents converted
             according to the rules of the
             encryption.
             Encryption data contents can't see
             people that don't have rules of the
             encryption.
             Therefore modern society protected
             information for the way.
Encryption works




Encryption technology use many places. For Example...

●   Credit-card information
●   Social Security numbers
●   Private correspondence
●   Personal details
●   Sensitive company information
●   Bank-account information ­
Type of Encryption




Encryption have many types. Explain that most popular types of
encryption called "cipher".
Please see the above figure. The figure shows that Vertical and
horizontal numbers correspond to alphabet. Therefore, for
example
    32 51 13 13 43 mean " H E L L O"
 Cipher is very simple and easy , but not secure.
Modern Encryption




Modern encryption use Prime number that very complex
operation encryption called "RSA" . It used many important
price , Bank , school, Public , and so on.
RSA is very strong, but use RSA is difficult.
Recently new encryption is appear. named "Public key
cryptosystem" it can easy see and strong protection.

More Related Content

What's hot

online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptographyAshish Kumar
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 
Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networksKajal Chaudhari
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...LeMeniz Infotech
 
Cryptoparty like it's 1999
Cryptoparty like it's 1999Cryptoparty like it's 1999
Cryptoparty like it's 1999mgohr
 

What's hot (16)

Encryption
EncryptionEncryption
Encryption
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
Eng12
Eng12Eng12
Eng12
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 
Week13
Week13Week13
Week13
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Cryptography in networks
Cryptography in networksCryptography in networks
Cryptography in networks
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Cryptoparty like it's 1999
Cryptoparty like it's 1999Cryptoparty like it's 1999
Cryptoparty like it's 1999
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Sw week12
Sw week12Sw week12
Sw week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 

Viewers also liked

KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelJon Todd
 
ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012
ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012
ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012Amazon Web Services
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at OktaAmazon Web Services
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...Amazon Web Services
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...Amazon Web Services
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 

Viewers also liked (9)

Energy ummba
Energy ummbaEnergy ummba
Energy ummba
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate Level
 
ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012
ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012
ARC201 AWS Database Tier Architecture Best Practices - AWS re: Invent 2012
 
Securing Your Data in AWS
Securing Your Data in AWSSecuring Your Data in AWS
Securing Your Data in AWS
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 

Similar to How encryption work

Security.pptx
Security.pptxSecurity.pptx
Security.pptxjohn6938
 
How encryption works
How encryption worksHow encryption works
How encryption workss1200019
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guideJD Liners
 
Week12
Week12Week12
Week12hiromu
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Petar Radanliev
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report cryptoGaurav Shukla
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
Cryptography intro
Cryptography introCryptography intro
Cryptography introismaelhaider
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systemsBirju Tank
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 

Similar to How encryption work (20)

Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Week11
Week11Week11
Week11
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Week12
Week12Week12
Week12
 
Ict Tikah
Ict TikahIct Tikah
Ict Tikah
 
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
Dr Petar Radanliev, PhD Thesis Department of Computer Sciences, University of...
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Encryption
EncryptionEncryption
Encryption
 

More from Yosuke Takabatake (8)

Com bubble
Com bubbleCom bubble
Com bubble
 
Japan economy
Japan economyJapan economy
Japan economy
 
The business of apple watch
The business of apple watchThe business of apple watch
The business of apple watch
 
新入生ガイダンス
新入生ガイダンス新入生ガイダンス
新入生ガイダンス
 
How h dcam work
How h dcam workHow h dcam work
How h dcam work
 
Batake presentation
Batake presentationBatake presentation
Batake presentation
 
How RSS works
How RSS worksHow RSS works
How RSS works
 
How Fiber Optics work
How Fiber Optics workHow Fiber Optics work
How Fiber Optics work
 

How encryption work

  • 1. How encryption work s1200025 Yosuke Takabatake Partner Junya Sato
  • 2. What's encryption ? The information required protection that other users attack , theft and so on. Therefore "encryption" was made. History of encryption is very old. For example, most old encryption is that "hieroglyph" in B.C. 19. Recently, encryption is most important in modern society that almost all people use computer, mobile device, and other electrical devices.
  • 3. What's encryption ? Electrical data copy can very easy way. because of , this data finally made of 1 or 0. therefore data protection want that Data Encryption. Detail of Data encryption is that Our data contents converted according to the rules of the encryption. Encryption data contents can't see people that don't have rules of the encryption. Therefore modern society protected information for the way.
  • 4. Encryption works Encryption technology use many places. For Example... ● Credit-card information ● Social Security numbers ● Private correspondence ● Personal details ● Sensitive company information ● Bank-account information ­
  • 5. Type of Encryption Encryption have many types. Explain that most popular types of encryption called "cipher". Please see the above figure. The figure shows that Vertical and horizontal numbers correspond to alphabet. Therefore, for example 32 51 13 13 43 mean " H E L L O" Cipher is very simple and easy , but not secure.
  • 6. Modern Encryption Modern encryption use Prime number that very complex operation encryption called "RSA" . It used many important price , Bank , school, Public , and so on. RSA is very strong, but use RSA is difficult. Recently new encryption is appear. named "Public key cryptosystem" it can easy see and strong protection.