SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Individual Slide Presentation:
           Week 12

    How Encryption Works

     S1170029 Takaki Tokiwa
1. Introduction to How Encryption
Works
● The incredible growth of the Internet has excited
businesses and consumers alike with its promise
of changing the way we live and work.
● It's extremely easy to buy and sell goods all over

the world while sitting in front of a laptop.
● But security is a major concern on the Internet,

especially when you're using it to send sensitive
information between parties.
2. Security Encryption Systems
● Computer encryption is based on the science of
cryptography, which has been used as long as
humans have wanted to keep information secret.
● Most forms of cryptography in use these days

rely on computers, simply because a human-
based code is too easy for a computer to crack.
● They provide a way in which to craft a message

and give a certain range of possible combinations.
A key, on the other hand, helps a person or
computer figure out the one possibility on a given
occasion.
3. Symmetric Key
● In symmetric-key encryption, each computer has
a secret key (code) that it can use to encrypt a
packet of information before it is sent over the
network to another computer.
● Symmetric-key requires that you know which

computers will be talking to each other so you can
install the key on each one.
●Symmetric-key encryption is essentially the same

as a secret code that each of the two computers
must know in order to decode the information. The
code provides the key to decoding the message.
4. Public Key Encryption
● Also known as asymmetric-key encryption,
public-key encryption uses a combination of a
private key and a public key.
● The private key is known only to your computer,

while the public key is given by your computer to
any computer that wants to communicate securely
with it.
● To decode an encrypted message, a computer

must use the public key, provided by the
originating computer, and its own private key.
● The public key used for encryption is published

and available to anyone, anyone who picks it up
can't read it without the private key.
5. SSL and TLS

● A popular implementation of public-key
encryption is the Secure Sockets Layer (SSL) .
● Originally developed by Netscape, SSL is an

Internet security protocol used by Internet
browsers and Web servers to transmit sensitive
information.
● SSL has become part of an overall security

protocol known as Transport Layer Security (TLS).
6. Hashing Algorithm

● The key in public-key encryption is based on a
hash value.
● This is a value that is computed from a base

input number using a hashing algorithm.
● Essentially, the hash value is a summary of the

original value.
● The important thing about a hash value is that it

is nearly impossible to derive the original input
number without knowing the data used to create
the hash value.

Más contenido relacionado

La actualidad más candente

Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 

La actualidad más candente (18)

Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Week12
Week12Week12
Week12
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Cryptography
Cryptography Cryptography
Cryptography
 
N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
S&Wweek12
S&Wweek12S&Wweek12
S&Wweek12
 
Steganography
SteganographySteganography
Steganography
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Sp W12
Sp W12Sp W12
Sp W12
 
Cryto Party at CCU
Cryto Party at CCUCryto Party at CCU
Cryto Party at CCU
 
Week13
Week13Week13
Week13
 
Steganography
SteganographySteganography
Steganography
 
How encryption work
How encryption workHow encryption work
How encryption work
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Crytography
CrytographyCrytography
Crytography
 
Cryptography
CryptographyCryptography
Cryptography
 
Week13
Week13Week13
Week13
 

Similar a Eng12

How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
ray0510711s
 

Similar a Eng12 (20)

$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Week11
Week11Week11
Week11
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
04 authentication
04 authentication04 authentication
04 authentication
 
Encryption
EncryptionEncryption
Encryption
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
s117
s117s117
s117
 
Week12 b
Week12 bWeek12 b
Week12 b
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
cryptography
cryptographycryptography
cryptography
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Eng12

  • 1. Individual Slide Presentation: Week 12 How Encryption Works S1170029 Takaki Tokiwa
  • 2. 1. Introduction to How Encryption Works ● The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. ● It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop. ● But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.
  • 3. 2. Security Encryption Systems ● Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. ● Most forms of cryptography in use these days rely on computers, simply because a human- based code is too easy for a computer to crack. ● They provide a way in which to craft a message and give a certain range of possible combinations. A key, on the other hand, helps a person or computer figure out the one possibility on a given occasion.
  • 4. 3. Symmetric Key ● In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. ● Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. ●Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. 4. Public Key Encryption ● Also known as asymmetric-key encryption, public-key encryption uses a combination of a private key and a public key. ● The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. ● To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. ● The public key used for encryption is published and available to anyone, anyone who picks it up can't read it without the private key.
  • 6. 5. SSL and TLS ● A popular implementation of public-key encryption is the Secure Sockets Layer (SSL) . ● Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. ● SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 7. 6. Hashing Algorithm ● The key in public-key encryption is based on a hash value. ● This is a value that is computed from a base input number using a hashing algorithm. ● Essentially, the hash value is a summary of the original value. ● The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.