SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
How Encryption For Strong Security
              Works
●   Pseudoramdom Noise
●   Data Encryption
●   Link Encryption
●   VPN

                           s1170132 Manamu Abe
                         s1170133 Keigo Amma
                       s1170144 Ryo Kanno
                      s1170145 Masataka Kubota
Pseudoramdom Noise
●   In cryptography,
    pseudorandom noise
    (PRN) is signal similar
    to noise which satisfies
    one or more of the
    standard test for
    statistical randomness.
Data Encryption
●   Data encryption
    is a process in
    which plaintext
    data is
    converted into
    ciphertext so
    that it cannot be
    read.
Link Encryption
●   Link encryption is the
    data security process
    of encrypting
    information at the
    data link level as it is
    transmitted between
    two points within a
    network.
VPN
●VPN(Virtual Private
Network) is service to
connect data
communications
between systems.

●
  We can use public
lines like common
carrier leased lines with
VPN
REFERENCE
 Pseuderandom                     Noise
 http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache
 http://en.wikipedia.org/wiki/Pseudorandom_noise


 Data      Encryption
 http://www.wisegeek.com/what-is-data-encryption.htm
 http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm


 Link     Encryption
 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html
 http://www.palowireless.com/bluearticles/cc1_security1.asp


 VPN
 http://en.wikipedia.org/wiki/Vpn
  http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0

Weitere ähnliche Inhalte

Was ist angesagt?

Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Muhammad Farooq Hussain
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffersWanwen Wen
 

Was ist angesagt? (15)

Poster-A4
Poster-A4Poster-A4
Poster-A4
 
Cryptography
Cryptography Cryptography
Cryptography
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Kadai
KadaiKadai
Kadai
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Ss
SsSs
Ss
 

Andere mochten auch

Andere mochten auch (20)

Yacht charters
Yacht chartersYacht charters
Yacht charters
 
Ssiivu1
Ssiivu1Ssiivu1
Ssiivu1
 
Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009
 
Accenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_reportAccenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_report
 
竺宇峰
竺宇峰竺宇峰
竺宇峰
 
Magico
MagicoMagico
Magico
 
SheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption InfographicSheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption Infographic
 
Savethedate3
Savethedate3Savethedate3
Savethedate3
 
Earth Science Jeopardy
Earth Science JeopardyEarth Science Jeopardy
Earth Science Jeopardy
 
Jupiterimages Catalog
Jupiterimages CatalogJupiterimages Catalog
Jupiterimages Catalog
 
Karina
KarinaKarina
Karina
 
Atlanta Briefing Part 1
Atlanta Briefing Part 1Atlanta Briefing Part 1
Atlanta Briefing Part 1
 
Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009
 
Good Advice
Good AdviceGood Advice
Good Advice
 
International Trade And Business
International Trade And BusinessInternational Trade And Business
International Trade And Business
 
Lizeth And Jenny`S Project
Lizeth And Jenny`S ProjectLizeth And Jenny`S Project
Lizeth And Jenny`S Project
 
MANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORASMANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORAS
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Learningapps2
Learningapps2Learningapps2
Learningapps2
 
1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health 1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health
 

Ähnlich wie How Encryption Works for Strong Security

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Week13presen
Week13presenWeek13presen
Week13presens1160131
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 

Ähnlich wie How Encryption Works for Strong Security (20)

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Security F
Security FSecurity F
Security F
 
Group3
Group3Group3
Group3
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Ga13
Ga13Ga13
Ga13
 
Week13
Week13Week13
Week13
 
English2
English2English2
English2
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn
Vpn Vpn
Vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Week13
Week13Week13
Week13
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 

Mehr von tykl94

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)tykl94
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationtykl94
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2tykl94
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2tykl94
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1tykl94
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3tykl94
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1tykl94
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5tykl94
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4tykl94
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3tykl94
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2tykl94
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1tykl94
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4tykl94
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3tykl94
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1tykl94
 
Week7 1m
Week7 1mWeek7 1m
Week7 1mtykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1tykl94
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignmenttykl94
 

Mehr von tykl94 (20)

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentation
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1
 
Week7 1m
Week7 1mWeek7 1m
Week7 1m
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignment
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

How Encryption Works for Strong Security

  • 1. How Encryption For Strong Security Works ● Pseudoramdom Noise ● Data Encryption ● Link Encryption ● VPN s1170132 Manamu Abe s1170133 Keigo Amma s1170144 Ryo Kanno s1170145 Masataka Kubota
  • 2. Pseudoramdom Noise ● In cryptography, pseudorandom noise (PRN) is signal similar to noise which satisfies one or more of the standard test for statistical randomness.
  • 3. Data Encryption ● Data encryption is a process in which plaintext data is converted into ciphertext so that it cannot be read.
  • 4. Link Encryption ● Link encryption is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.
  • 5. VPN ●VPN(Virtual Private Network) is service to connect data communications between systems. ● We can use public lines like common carrier leased lines with VPN
  • 6. REFERENCE  Pseuderandom Noise http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache http://en.wikipedia.org/wiki/Pseudorandom_noise  Data Encryption http://www.wisegeek.com/what-is-data-encryption.htm http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm  Link Encryption http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html http://www.palowireless.com/bluearticles/cc1_security1.asp  VPN http://en.wikipedia.org/wiki/Vpn http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0