SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
How Encryption Works

      S1170048

     Susumu Ito
Introduction to How
     Encryption Works



Ordering something over the Internet,
whether it's a book, a CD or anything else
from an online vendor, or signing up for an
online account, requires entering in a good
deal of sensitive personal information.
Security Encryption
          Systems



Computer encryption is based on the science of
cryptography, which has been used as long as
humans have wanted to keep information secret.
Before the digital age, the biggest users of
cryptography were governments, particularly for
military purposes.
Public Key Encryption
In November 1976, a paper published in the
journal IEEE Transactions on Information
Theory, titled "New Directions in
Cryptography," addressed this problem and
offered up a solution: public-key encryption.
One very popular public-key encryption
program is Pretty Good Privacy (PGP), which
allows you to encrypt almost anything.
SSL and TLS


A popular implementation of public-key encryption
is the Secure Sockets Layer (SSL). Originally
developed by Netscape, SSL is an Internet security
protocol used by Internet browsers and Web
servers to transmit sensitive information. SSL has
become part of an overall security protocol known
as Transport Layer Security (TLS).
Hashing Algorithm
  Input number Hashing algorithm Hash value
    10,667     Input # x 143      1,525,381

You can see how hard it would be to determine
that the value 1,525,381 came from the
multiplication of 10,667 and 143. But if you knew
that the multiplier was 143, then it would be very
easy to calculate the value 10,667. Public-key
encryption is actually much more complex than this
example, but that's the basic idea.
Authentication
●   Password - The use of a user name and
    password provides the most common form of
    authentication. You enter your name and
    password when prompted by the computer. It
    checks the pair against a secure file to confirm. If
    either the name or the password does not
    match, then you are not allowed further access.
●   Pass cards - These cards can range from a
    simple card with a magnetic strip, similar to a
    credit card, to sophisticated smart cards that
    have an embedded computer chip.

Weitere ähnliche Inhalte

Was ist angesagt? (11)

Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
s117
s117s117
s117
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Week12
Week12Week12
Week12
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Ss
SsSs
Ss
 

Andere mochten auch (20)

Week4 a2
Week4 a2Week4 a2
Week4 a2
 
W11 b
W11 bW11 b
W11 b
 
C w3
C w3C w3
C w3
 
Presentation w6
Presentation w6Presentation w6
Presentation w6
 
C w6
C w6C w6
C w6
 
B w6
B w6B w6
B w6
 
C w3
C w3C w3
C w3
 
Week9 b
Week9 bWeek9 b
Week9 b
 
C w3
C w3C w3
C w3
 
C w3
C w3C w3
C w3
 
C w5
C w5C w5
C w5
 
S P W13
S P W13S P W13
S P W13
 
Espolon Oeste
Espolon OesteEspolon Oeste
Espolon Oeste
 
Green2
Green2Green2
Green2
 
Espolon Oeste
Espolon OesteEspolon Oeste
Espolon Oeste
 
B
BB
B
 
Week10 b
Week10 bWeek10 b
Week10 b
 
Slide w12
Slide w12Slide w12
Slide w12
 
Dia De Los Muertos
Dia De Los MuertosDia De Los Muertos
Dia De Los Muertos
 
Energy Efficiency In The Office
Energy Efficiency In The OfficeEnergy Efficiency In The Office
Energy Efficiency In The Office
 

Ähnlich wie Sp W12

Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
s1190091
 
How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 
Week12
Week12Week12
Week12
hiromu
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
Faith Nweke
 

Ähnlich wie Sp W12 (20)

Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Information Security
Information SecurityInformation Security
Information Security
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Week12
Week12Week12
Week12
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Data encryption
Data encryptionData encryption
Data encryption
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Week12
Week12Week12
Week12
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 

Mehr von Susumu Ito (15)

Week12 b
Week12 bWeek12 b
Week12 b
 
Week7 b
Week7 bWeek7 b
Week7 b
 
Week4 a2
Week4 a2Week4 a2
Week4 a2
 
C w7
C w7C w7
C w7
 
C w4
C w4C w4
C w4
 
C w3
C w3C w3
C w3
 
Peer5
Peer5Peer5
Peer5
 
Peer4
Peer4Peer4
Peer4
 
Peer2
Peer2Peer2
Peer2
 
Peer1
Peer1Peer1
Peer1
 
Slide
SlideSlide
Slide
 
w4_B
w4_Bw4_B
w4_B
 
w4_A
w4_Aw4_A
w4_A
 
Sp W13
Sp W13Sp W13
Sp W13
 
Sp W11
Sp W11Sp W11
Sp W11
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Sp W12

  • 1. How Encryption Works S1170048 Susumu Ito
  • 2. Introduction to How Encryption Works Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 3. Security Encryption Systems Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes.
  • 4. Public Key Encryption In November 1976, a paper published in the journal IEEE Transactions on Information Theory, titled "New Directions in Cryptography," addressed this problem and offered up a solution: public-key encryption. One very popular public-key encryption program is Pretty Good Privacy (PGP), which allows you to encrypt almost anything.
  • 5. SSL and TLS A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 6. Hashing Algorithm Input number Hashing algorithm Hash value 10,667 Input # x 143 1,525,381 You can see how hard it would be to determine that the value 1,525,381 came from the multiplication of 10,667 and 143. But if you knew that the multiplier was 143, then it would be very easy to calculate the value 10,667. Public-key encryption is actually much more complex than this example, but that's the basic idea.
  • 7. Authentication ● Password - The use of a user name and password provides the most common form of authentication. You enter your name and password when prompted by the computer. It checks the pair against a secure file to confirm. If either the name or the password does not match, then you are not allowed further access. ● Pass cards - These cards can range from a simple card with a magnetic strip, similar to a credit card, to sophisticated smart cards that have an embedded computer chip.