SlideShare a Scribd company logo
About  Encryption  s1190095
The Encryption have three types. 1. Steganography   2. Cord 3. Cipher When  the Encryption are used?
It uses key for which is same as are used for encryption or  can't derive easy.
Example DES
AES What Common key cryptosystem is?
Create two keys. One is used for decoding, another is used for encoding.
Example RSA

More Related Content

DOCX
What is TLS/SSL?
PDF
Introduction to TLS-1.3
PDF
Transport Layer Security
PPT
Secure Sockets Layer and Transport Layer Security
PPTX
Ssl and tls
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
PPTX
All you need to know about transport layer security
PDF
Transport Layer Security - Mrinal Wadhwa
What is TLS/SSL?
Introduction to TLS-1.3
Transport Layer Security
Secure Sockets Layer and Transport Layer Security
Ssl and tls
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
All you need to know about transport layer security
Transport Layer Security - Mrinal Wadhwa

What's hot (9)

PDF
暗認本読書会9
DOC
PPTX
Transport Layer Security
PPT
Cryptography - Overview
PPT
PPTX
Transport Layer Security
PDF
Compression and information leakage of plaintext
PPTX
Transport layer security (tls)
暗認本読書会9
Transport Layer Security
Cryptography - Overview
Transport Layer Security
Compression and information leakage of plaintext
Transport layer security (tls)
Ad

Similar to About encryption (20)

PPTX
ENCRYPTION.pptx
PDF
無題 1
ODP
Week12 b
PDF
Week 12 slide
PDF
Week 12 slide
PDF
How encryption works
PPTX
Information Security
PPT
enkripsi and authentication
PDF
Sw prezen3pdf
PDF
Sw2 prezen3pdf
PPT
Cryptography in Human computer interaction powerpoint
PDF
week 12
PPTX
SSL/TLS Eavesdropping with Fullpath Control
PDF
s117
DOCX
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
PPTX
Cryptography
PDF
Introduction of an SSL Certificate
PDF
The world of encryption
PPTX
Transport layer security
PPT
Secure Socket Layer (SSL)
ENCRYPTION.pptx
無題 1
Week12 b
Week 12 slide
Week 12 slide
How encryption works
Information Security
enkripsi and authentication
Sw prezen3pdf
Sw2 prezen3pdf
Cryptography in Human computer interaction powerpoint
week 12
SSL/TLS Eavesdropping with Fullpath Control
s117
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptography
Introduction of an SSL Certificate
The world of encryption
Transport layer security
Secure Socket Layer (SSL)
Ad

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

About encryption