SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
How Encryption Works



       S1170151
     Hideyuki Sato
Introduction to How Encryption Works

The growth of the Internet has excited businesses and consumers
alike with its promise of changing the way we live and work.
But doing business online means there's a whole lot of informa-
tion that we don't want other people to see.
Information security is provided on computers and over the Inter-
net by a variety of methods.
A simple but straightforward security method is to only keep
sensitive information on removable storage media like portable
flash memory drives or external hard drives.
But the most popular forms of security all rely on encryption,
the process of encoding information in such a way that only the
person or computer with the key can decode it.
Encryption and Authentication I

Encryption
Encryption is the process of taking all of the data that one computer
is sending to another and encoding it into a form that only the other
computer will be able to decode.
Most forms of cryptography in use these days rely on computers,
simply because a human-based code is too easy for a computer to
crack.
Ciphers are also better known today as algorithms, which are the
guides for encryption -- they provide a way in which to craft a mes-
sage and give a certain range of possible combinations.
A key, on the other hand, helps a person or computer figure out the
one possibility on a given occasion.


・Symmetric Key Encryption

・Public Key Encryption
Encryption and Authentication II

Symmetric Key Encryption
Just like two Spartan generals sending messages to each other,
computers using symmetric key encryption to send information
between each other must have the same key.
In symmetric key encryption, each computer has a secret key
(code) that it can use to encrypt a packet of information before
it is sent over the network to another computer.
Symmetric key requires that you know which computers will be
talking to each other so you can install the key on each one.
The code provides the key to decoding the message.


・DES (Data Encryption Standard)

・AES (Advanced Encryption Standard)
Encryption and Authentication III

Public Key Encryption
Also known as asymmetric key encryption, public key encryption uses
two different keys at once -- a combination of a private key and a
public key.
The private key is known only to your computer, while the public key
is given by your computer to any computer that wants to communicate
securely with it.
To decode an encrypted message, a computer must use the public key,
provided by the originating computer, and its own private key.
Although a message sent from one computer to another won't be secure
since the public key used for encryption is published and available
to anyone, anyone who picks it up can't read it without the private
key.


・PGP (Pretty Good Privacy)
Encryption and Authentication IV

Authentication
Authentication is used to verify that the information comes from
a trusted source.

・Password

・Pass cards

・Digital signatures

・Fingerprint scan

・Retina scan

・Face scan

・Voice identification
SSL and TLS

Secure Sockets Layer
Transport Layer Security
A popular implementation of public key encryption is the Secure Sockets
Layer (SSL).
SSL is an Internet security protocol used by Internet browsers and Web
servers to transmit sensitive information.
SSL has become part of an overall security protocol known as Transport
Layer Security (TLS).
The browser then uses the public key to encrypt a randomly selected sym-
metric key.
Public-key encryption takes a lot of computing, so most systems use a
combination of public key and symmetric key encryption.
When two computers initiate a secure session, one computer creates a sym-
metric key and sends it to the other computer using public key encryp-
tion.
The two computers can then communicate using symmetric key encryption.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (6)

Ss
SsSs
Ss
 
Week11
Week11Week11
Week11
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 

Andere mochten auch

BB Freak
BB FreakBB Freak
BB Freakzerwaf
 
Good Software Engineering Practices by Jesse Panganiban
Good Software Engineering Practices by Jesse PanganibanGood Software Engineering Practices by Jesse Panganiban
Good Software Engineering Practices by Jesse PanganibanWebGeek Philippines
 
Ühiskond 1920.-30. aastatel
Ühiskond 1920.-30. aastatelÜhiskond 1920.-30. aastatel
Ühiskond 1920.-30. aastatelguest2df539a
 
üHiskond 1920. 30. Aastatel
üHiskond 1920. 30. AastatelüHiskond 1920. 30. Aastatel
üHiskond 1920. 30. Aastatelguest2df539a
 
Electronic Arrangements[1]
Electronic Arrangements[1]Electronic Arrangements[1]
Electronic Arrangements[1]bishopbriggsboy
 
8 Character (Life Mission Statement) [Google]
8 Character (Life Mission Statement) [Google]8 Character (Life Mission Statement) [Google]
8 Character (Life Mission Statement) [Google]ChuckChan
 
üHiskond 1920. 30. Aastatel
üHiskond 1920. 30. AastatelüHiskond 1920. 30. Aastatel
üHiskond 1920. 30. Aastatelguest2df539a
 
Kumpulan Soal Matematika Elas 7
Kumpulan Soal Matematika Elas 7Kumpulan Soal Matematika Elas 7
Kumpulan Soal Matematika Elas 7guestbdc1cd31
 

Andere mochten auch (16)

$ii7oi5i-13
$ii7oi5i-13$ii7oi5i-13
$ii7oi5i-13
 
$ii7oi5i-13
$ii7oi5i-13$ii7oi5i-13
$ii7oi5i-13
 
BB Freak
BB FreakBB Freak
BB Freak
 
Good Software Engineering Practices by Jesse Panganiban
Good Software Engineering Practices by Jesse PanganibanGood Software Engineering Practices by Jesse Panganiban
Good Software Engineering Practices by Jesse Panganiban
 
$ii7oi5i-13
$ii7oi5i-13$ii7oi5i-13
$ii7oi5i-13
 
$ii7oi5i-13
$ii7oi5i-13$ii7oi5i-13
$ii7oi5i-13
 
$ii7oi5i-11
$ii7oi5i-11$ii7oi5i-11
$ii7oi5i-11
 
$ii7oi5i-13
$ii7oi5i-13$ii7oi5i-13
$ii7oi5i-13
 
$ii7oi5i-13
$ii7oi5i-13$ii7oi5i-13
$ii7oi5i-13
 
$ii7oi5i-10
$ii7oi5i-10$ii7oi5i-10
$ii7oi5i-10
 
Ühiskond 1920.-30. aastatel
Ühiskond 1920.-30. aastatelÜhiskond 1920.-30. aastatel
Ühiskond 1920.-30. aastatel
 
üHiskond 1920. 30. Aastatel
üHiskond 1920. 30. AastatelüHiskond 1920. 30. Aastatel
üHiskond 1920. 30. Aastatel
 
Electronic Arrangements[1]
Electronic Arrangements[1]Electronic Arrangements[1]
Electronic Arrangements[1]
 
8 Character (Life Mission Statement) [Google]
8 Character (Life Mission Statement) [Google]8 Character (Life Mission Statement) [Google]
8 Character (Life Mission Statement) [Google]
 
üHiskond 1920. 30. Aastatel
üHiskond 1920. 30. AastatelüHiskond 1920. 30. Aastatel
üHiskond 1920. 30. Aastatel
 
Kumpulan Soal Matematika Elas 7
Kumpulan Soal Matematika Elas 7Kumpulan Soal Matematika Elas 7
Kumpulan Soal Matematika Elas 7
 

Ähnlich wie $ii7oi5i-12 (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week11
Week11Week11
Week11
 
Eng12
Eng12Eng12
Eng12
 
Sw2
Sw2Sw2
Sw2
 
SW Week12
SW Week12 SW Week12
SW Week12
 
Week12
Week12Week12
Week12
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week12
Week12Week12
Week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Kadai1
Kadai1Kadai1
Kadai1
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

Kürzlich hochgeladen

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 

Kürzlich hochgeladen (20)

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 

$ii7oi5i-12

  • 1. How Encryption Works S1170151 Hideyuki Sato
  • 2. Introduction to How Encryption Works The growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. But doing business online means there's a whole lot of informa- tion that we don't want other people to see. Information security is provided on computers and over the Inter- net by a variety of methods. A simple but straightforward security method is to only keep sensitive information on removable storage media like portable flash memory drives or external hard drives. But the most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person or computer with the key can decode it.
  • 3. Encryption and Authentication I Encryption Encryption is the process of taking all of the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a mes- sage and give a certain range of possible combinations. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion. ・Symmetric Key Encryption ・Public Key Encryption
  • 4. Encryption and Authentication II Symmetric Key Encryption Just like two Spartan generals sending messages to each other, computers using symmetric key encryption to send information between each other must have the same key. In symmetric key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric key requires that you know which computers will be talking to each other so you can install the key on each one. The code provides the key to decoding the message. ・DES (Data Encryption Standard) ・AES (Advanced Encryption Standard)
  • 5. Encryption and Authentication III Public Key Encryption Also known as asymmetric key encryption, public key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. Although a message sent from one computer to another won't be secure since the public key used for encryption is published and available to anyone, anyone who picks it up can't read it without the private key. ・PGP (Pretty Good Privacy)
  • 6. Encryption and Authentication IV Authentication Authentication is used to verify that the information comes from a trusted source. ・Password ・Pass cards ・Digital signatures ・Fingerprint scan ・Retina scan ・Face scan ・Voice identification
  • 7. SSL and TLS Secure Sockets Layer Transport Layer Security A popular implementation of public key encryption is the Secure Sockets Layer (SSL). SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). The browser then uses the public key to encrypt a randomly selected sym- metric key. Public-key encryption takes a lot of computing, so most systems use a combination of public key and symmetric key encryption. When two computers initiate a secure session, one computer creates a sym- metric key and sends it to the other computer using public key encryp- tion. The two computers can then communicate using symmetric key encryption.