SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption Works
       Encryption
      Symmetric-key
         encryption
       Public-key
         encryption
       SSL and TLS
    Hashing Algorithm

               s1170156 Saki Seino
Encryption
   Encryption is short          1   2   3    4    5
    for “Security            1   A   B   C    D    E
    Encryption               2   F   G   H   I/J   K
    systems.”                3   L   M   N    O    P
   Encryption is based      4   Q   R   S    T    U
    on the science of        5   V   W   X    Y    Z
    “cryptography.”       
                            If I say I AM SAKI,
   For example...->         I write numbers:
                             42 11 23 34 11 52 42
Symmetric-key encryption
   Symmetric-key encryption is used to
    send information between each other
    must have the same key.
   For example, when you send message,
    “A” becomes “C”, “B” becomes
    “D”. You have already told friend the
    code is “Shift by 2.” It is called
    key.
   Computer use more complex key.
Public-key encryption
 Symmetric-key encryption has some
  weakness point. One of it is that
  attacker can easily pluck the
  data.
 Public-key encryption, two keys
  are used.
 They are a private key and public
  key.
SSL and TLS
   SSL is short for
    “Secure Sockets
    Layer.”
   TSL is short for
    “Transport Layer        The padlock symbol
    Security.”               lets you know that
   Public-key               you are using
    encryption is used       encryption.
    for SSL.
Hashing algorithm
   The key in Public-key encryption is
    based on a Hash value.
   For example:
   Input:10,667 -> hash value:1,525,381
   You can see how hard it would be to
    determine that value 1,525,381 come
    from the multiplication of 10,667 and
    143.

More Related Content

What's hot

Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
anusachu .
 
Digital signature
Digital signatureDigital signature
Digital signature
Sadhana28
 

What's hot (20)

Traditional symmetric-key cipher
Traditional symmetric-key cipherTraditional symmetric-key cipher
Traditional symmetric-key cipher
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Data encryption
Data encryptionData encryption
Data encryption
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Cryptography Attacks and Applications
Cryptography Attacks and ApplicationsCryptography Attacks and Applications
Cryptography Attacks and Applications
 
Encryption
EncryptionEncryption
Encryption
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 
Blind Signature Scheme
Blind Signature SchemeBlind Signature Scheme
Blind Signature Scheme
 
Information Security
Information SecurityInformation Security
Information Security
 

Similar to SW2 week12 slide s1170156 Saki Seino

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
Aaron Zauner
 
About encryption
About encryptionAbout encryption
About encryption
a0109
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
How encryption works
How encryption worksHow encryption works
How encryption works
Mariko Saitoh
 
Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)
Aaron Zauner
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
 

Similar to SW2 week12 slide s1170156 Saki Seino (20)

Is case study
Is   case studyIs   case study
Is case study
 
Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
Cryptography
CryptographyCryptography
Cryptography
 
About encryption
About encryptionAbout encryption
About encryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)Cryptography 130919084510-phpapp02(2)
Cryptography 130919084510-phpapp02(2)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Crypt
CryptCrypt
Crypt
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryption
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

SW2 week12 slide s1170156 Saki Seino

  • 1. How Encryption Works  Encryption  Symmetric-key encryption  Public-key encryption  SSL and TLS  Hashing Algorithm  s1170156 Saki Seino
  • 2. Encryption  Encryption is short  1 2 3 4 5 for “Security  1 A B C D E Encryption  2 F G H I/J K systems.”  3 L M N O P  Encryption is based  4 Q R S T U on the science of  5 V W X Y Z “cryptography.”    If I say I AM SAKI,  For example...->  I write numbers:  42 11 23 34 11 52 42
  • 3. Symmetric-key encryption  Symmetric-key encryption is used to send information between each other must have the same key.  For example, when you send message, “A” becomes “C”, “B” becomes “D”. You have already told friend the code is “Shift by 2.” It is called key.  Computer use more complex key.
  • 4. Public-key encryption  Symmetric-key encryption has some weakness point. One of it is that attacker can easily pluck the data.  Public-key encryption, two keys are used.  They are a private key and public key.
  • 5. SSL and TLS  SSL is short for “Secure Sockets Layer.”  TSL is short for “Transport Layer  The padlock symbol Security.” lets you know that  Public-key you are using encryption is used encryption. for SSL.
  • 6. Hashing algorithm  The key in Public-key encryption is based on a Hash value.  For example:  Input:10,667 -> hash value:1,525,381  You can see how hard it would be to determine that value 1,525,381 come from the multiplication of 10,667 and 143.