SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
1.Introduction to How Encryption Systems
You are usually related to various encryption systems.
For example,
Credit-card information          Social Security numbers
Private correspondence         Personal details
Sensitive company information     Bank-account information

Thus, encryption systems are very important.


In this article, you will learn about encryption and
authentication. You will also learn about public-key
and symmetric-key systems, as well as hash
algorithms.
2.Security Encryption Systems
・Encryption
It is based on the science of cryptography.
・The first cipher (The Greeks used this way )
     1   2   3   4     5   For example:
 1   A   B   C   D     E   I AM SPARTA
 2   F   G   H   I/J   K   → 42 11 23 34 53 11 24 44 11
 3   L   M   N   O     P
 4   Q   R   S   T     U   I AM SATO
 5   V   W   X   Y     Z   → 42 11 23 34 11 44 43
If they could arrange the letters inside the grid in any
combination, you could not decode any message.
・Computer encryption sytems
 - Symmetric-key encryption
 - Public-key encryption
3.Symmetric Key
●   Computers using symmetric-key encryption to
    send information between each other must
    have the same key.
●   In symmetric-key encryption, each computer
    has a secret key (code) that it can use to
    encrypt a packet of information before it is sent
    over the network to another computer.
●    Symmetric-key requires that you know which
    computers will be talking to each other so you
    can install the key on each one.
4.Public key Encryption
・Encryption
Public-key encryption uses two different keys at
once to combine a private key and a public key.
・How to communicate securely
The private key is known only to your computer.
The public key is given to any computer.
1. An encrypted message is created by the public key.
 - The public key only can encrypt information.
2. An encrypted message is sent the originating computer.
 - The originating computer only can decode it.

 The key pair is based on prime numbers, meaning key
 has infinite possibilities and extremely secure.
5.SSL and TLS
・Origin
Secure Sockets Layer (SSL) was developed by Netscape,
SSL is an Internet security protocol used by Internet
browser and Web servers.
SSL is packaged on Transport Layer Security.
・Locations
SSL is used by online bank or a payment transfer
service,such as PayPal or Google Checkout.
・How to know
If you could look the "https" in the addressbar, this web
page is used SSL to protect sensitive information and to
secure communication.
SSL's certificate is made from a trusted party.
6.Hashing Algorithm
●   The key in public-key encryption is based
    on a hash value.
    Hash is a value that is computed from a base
    input number using a hashing algorithm.
    Essentially, the hash value is a summary of the
    original value. The important thing about a hash
    value is that it is nearly impossible to derive the
    original input number without knowing the data
    used to create the hash value.

Weitere ähnliche Inhalte

Was ist angesagt? (8)

Sw2
Sw2Sw2
Sw2
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Eng12
Eng12Eng12
Eng12
 
Week12
Week12Week12
Week12
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Sp W12
Sp W12Sp W12
Sp W12
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 

Ähnlich wie Week12

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
s1190091
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
 

Ähnlich wie Week12 (20)

s117
s117s117
s117
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
week 12
week 12week 12
week 12
 
Information Security
Information SecurityInformation Security
Information Security
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Security pre
Security preSecurity pre
Security pre
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Week12
Week12Week12
Week12
 
Ss
SsSs
Ss
 
Data encryption
Data encryptionData encryption
Data encryption
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 

Mehr von s1180181 (7)

Week11
Week11Week11
Week11
 
How Fiber Optics Work
How Fiber Optics WorkHow Fiber Optics Work
How Fiber Optics Work
 
How Fiber Optics Works
How Fiber Optics WorksHow Fiber Optics Works
How Fiber Optics Works
 
12 14tes
12 14tes12 14tes
12 14tes
 
Tes
TesTes
Tes
 
Sasaki
SasakiSasaki
Sasaki
 
Sasasa
SasasaSasasa
Sasasa
 

Week12

  • 1. 1.Introduction to How Encryption Systems You are usually related to various encryption systems. For example, Credit-card information          Social Security numbers Private correspondence         Personal details Sensitive company information     Bank-account information Thus, encryption systems are very important. In this article, you will learn about encryption and authentication. You will also learn about public-key and symmetric-key systems, as well as hash algorithms.
  • 2. 2.Security Encryption Systems ・Encryption It is based on the science of cryptography. ・The first cipher (The Greeks used this way ) 1 2 3 4 5 For example: 1 A B C D E I AM SPARTA 2 F G H I/J K → 42 11 23 34 53 11 24 44 11 3 L M N O P 4 Q R S T U I AM SATO 5 V W X Y Z → 42 11 23 34 11 44 43 If they could arrange the letters inside the grid in any combination, you could not decode any message. ・Computer encryption sytems - Symmetric-key encryption - Public-key encryption
  • 3. 3.Symmetric Key ● Computers using symmetric-key encryption to send information between each other must have the same key. ● In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. ● Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one.
  • 4. 4.Public key Encryption ・Encryption Public-key encryption uses two different keys at once to combine a private key and a public key. ・How to communicate securely The private key is known only to your computer. The public key is given to any computer. 1. An encrypted message is created by the public key. - The public key only can encrypt information. 2. An encrypted message is sent the originating computer. - The originating computer only can decode it. The key pair is based on prime numbers, meaning key has infinite possibilities and extremely secure.
  • 5. 5.SSL and TLS ・Origin Secure Sockets Layer (SSL) was developed by Netscape, SSL is an Internet security protocol used by Internet browser and Web servers. SSL is packaged on Transport Layer Security. ・Locations SSL is used by online bank or a payment transfer service,such as PayPal or Google Checkout. ・How to know If you could look the "https" in the addressbar, this web page is used SSL to protect sensitive information and to secure communication. SSL's certificate is made from a trusted party.
  • 6. 6.Hashing Algorithm ● The key in public-key encryption is based on a hash value. Hash is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.