SlideShare a Scribd company logo
1 of 6
How Encryption for Strong Security Works Group Web Presentation Week 13 Group C s1160149 Asami Nakashima  s1160156 Miki Nakayama  s1160163 Ryosuke Nitta  s1160167 Kazunori Hashimoto
Key In encryption, It is formed by string of numbers.  Encrypted data is cancel out the pseudorandom noise and extract the real data by only same key in the destination device.
File encryption It protects files in central servers and mass storage devices from being read or changed without an encryption key.
Data encryption It is to bury real data in the pseudorandom “noise”.  An encryption program uses a string of numbers called a key to create a stream of data combining the real infomation.
Link encryption It is between routers and the PC's to protect the entire stream of data.
VPN It is abbreviation of the virtual private network.  This network is formed by link encryption.  And, It used across a private network or the Internet.

More Related Content

What's hot

How encryption works
How encryption worksHow encryption works
How encryption works
s1180012
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
I M
 

What's hot (14)

How encryption works
How encryption worksHow encryption works
How encryption works
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
Wannacry
WannacryWannacry
Wannacry
 
Wannacry
WannacryWannacry
Wannacry
 
Btech cse dotnet list
Btech cse dotnet listBtech cse dotnet list
Btech cse dotnet list
 
Week13
Week13Week13
Week13
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Wanna cry
Wanna cryWanna cry
Wanna cry
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 

Viewers also liked

Viewers also liked (20)

Yes We Can
Yes We CanYes We Can
Yes We Can
 
Biototal
BiototalBiototal
Biototal
 
Holler Sydney Office Admin Job
Holler Sydney Office Admin JobHoller Sydney Office Admin Job
Holler Sydney Office Admin Job
 
Hechoscon
HechosconHechoscon
Hechoscon
 
Straw Cutout Copy
Straw Cutout CopyStraw Cutout Copy
Straw Cutout Copy
 
10 Deep Breaths
10 Deep Breaths10 Deep Breaths
10 Deep Breaths
 
Brood en Wijn
Brood en WijnBrood en Wijn
Brood en Wijn
 
Mis Libros
Mis LibrosMis Libros
Mis Libros
 
Escuela Museo Virtual
Escuela Museo VirtualEscuela Museo Virtual
Escuela Museo Virtual
 
DIY Escajeda
DIY EscajedaDIY Escajeda
DIY Escajeda
 
Tricia Spellman's Resume
Tricia Spellman's ResumeTricia Spellman's Resume
Tricia Spellman's Resume
 
bus utilitario
bus utilitariobus utilitario
bus utilitario
 
Connect by Christina Small
Connect by Christina SmallConnect by Christina Small
Connect by Christina Small
 
Hamilton Naki 2
Hamilton Naki 2Hamilton Naki 2
Hamilton Naki 2
 
Tags
TagsTags
Tags
 
Success Booster Model (c)
Success Booster Model (c)Success Booster Model (c)
Success Booster Model (c)
 
Pokemon Spoof #1 Remix
Pokemon Spoof #1 RemixPokemon Spoof #1 Remix
Pokemon Spoof #1 Remix
 
Powerpoint presentation (1)
Powerpoint presentation (1)Powerpoint presentation (1)
Powerpoint presentation (1)
 
Joseph Martinez portfolio
Joseph Martinez portfolioJoseph Martinez portfolio
Joseph Martinez portfolio
 
Cardiochirurgia Traumi
Cardiochirurgia   TraumiCardiochirurgia   Traumi
Cardiochirurgia Traumi
 

Similar to Web Presentation 13 (20)

Week13presen
Week13presenWeek13presen
Week13presen
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
presenw13
presenw13presenw13
presenw13
 
Gps4b
Gps4bGps4b
Gps4b
 
Week13 - Group Presentation Slide
Week13 - Group Presentation SlideWeek13 - Group Presentation Slide
Week13 - Group Presentation Slide
 
Gps4
Gps4Gps4
Gps4
 
Gps4b
Gps4bGps4b
Gps4b
 
English2
English2English2
English2
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
week 12
week 12week 12
week 12
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Web Presentation 13

  • 1. How Encryption for Strong Security Works Group Web Presentation Week 13 Group C s1160149 Asami Nakashima s1160156 Miki Nakayama s1160163 Ryosuke Nitta s1160167 Kazunori Hashimoto
  • 2. Key In encryption, It is formed by string of numbers. Encrypted data is cancel out the pseudorandom noise and extract the real data by only same key in the destination device.
  • 3. File encryption It protects files in central servers and mass storage devices from being read or changed without an encryption key.
  • 4. Data encryption It is to bury real data in the pseudorandom “noise”. An encryption program uses a string of numbers called a key to create a stream of data combining the real infomation.
  • 5. Link encryption It is between routers and the PC's to protect the entire stream of data.
  • 6. VPN It is abbreviation of the virtual private network. This network is formed by link encryption. And, It used across a private network or the Internet.