This PowerPoint helps students to consider the concept of infinity.
Web Presentation 13
1. How Encryption for Strong Security Works Group Web Presentation Week 13 Group C s1160149 Asami Nakashima s1160156 Miki Nakayama s1160163 Ryosuke Nitta s1160167 Kazunori Hashimoto
2. Key In encryption, It is formed by string of numbers. Encrypted data is cancel out the pseudorandom noise and extract the real data by only same key in the destination device.
3. File encryption It protects files in central servers and mass storage devices from being read or changed without an encryption key.
4. Data encryption It is to bury real data in the pseudorandom “noise”. An encryption program uses a string of numbers called a key to create a stream of data combining the real infomation.
5. Link encryption It is between routers and the PC's to protect the entire stream of data.
6. VPN It is abbreviation of the virtual private network. This network is formed by link encryption. And, It used across a private network or the Internet.