SlideShare a Scribd company logo
How Encryption Works

  When we use the Internet, we're not always just
      clicking around and passively taking in
 information, such as reading news articles or blog
  posts -- a great deal of our time online involves
       sending others our own information.
  A typical transaction might include not only our
 names, e-mail addresses and physical address and
  phone number, but also passwords and personal
           identification numbers (PINs).
Information security is provided on computers and
     over the Internet by a variety of methods.
• Security Encryption Systems
• Computer encryption is based on the science of
  cryptography, which has been used as long as
  humans have wanted to keep information secret.
• As long as both generals had the correct cipher,
  they could decode any message the other sent.
• To make the message more difficult to decipher,
  they could arrange the letters inside the grid in any
  combination.
• Most forms of cryptography in use these days rely
  on computers, simply because a human-based
  code is too easy for a computer to crack.
• Computer encryption systems generally belong
  in one of two categories:
• Symmetric-key encryption
• Public-key encryption
• Symmetric Key
• Just like two Spartan generals sending messages to each
  other, computers using symmetric-key encryption to send
  information between each other must have the same key.

• In symmetric-key encryption, each computer has a secret
  key (code) that it can use to encrypt a packet of
  information before it is sent over the network to another
  computer. Symmetric-key requires that you know which
  computers will be talking to each other so you can install
  the key on each one. Symmetric-key encryption is
  essentially the same as a secret code that each of the two
  computers must know in order to decode the information.
  The code provides the key to decoding the message.
Caesar's Cipher
• Julius Caesar also used a similar substitution technique,
  shifting three letters up. If he wanted to say "CROSSING
  THE RUBICON," for instance, he'd write down "FURVV
  LQJWK HUXEL FRQ" instead. As you can see, the text is
  also broken up into even groups in order to make the size
  of each word less obvious.

• Think of it like this: You create a coded message to send to
  a friend in which each letter is substituted with the letter
  that is two down from it in the alphabet. So "A" becomes
  "C," and "B" becomes "D". You have already told a trusted
  friend that the code is "Shift by 2". Your friend gets the
  message and decodes it. Anyone else who sees the
  message will see only nonsense.
SSL and TLS
• A popular implementation of public-key
  encryption is the Secure Sockets Layer
  (SSL). Originally developed by Netscape,
  SSL is an Internet security protocol used by
  Internet browsers and Web servers to
  transmit sensitive information. SSL has
  become part of an overall security protocol
  known as Transport Layer Security (TLS).
Hashing Algorithm
• The key in public-key encryption is based
  on a hash value. This is a value that is
  computed from a base input number using a
  hashing algorithm. Essentially, the hash
  value is a summary of the original value.
  The important thing about a hash value is
  that it is nearly impossible to derive the
  original input number without knowing the
  data used to create the hash value.
Authentication
• As stated earlier, encryption is the process of
  taking all of the data that one computer is sending
  to another and encoding it into a form that only the
  other computer will be able to decode. Another
  process, authentication, is used to verify that the
  information comes from a trusted source.
  Basically, if information is "authentic," you know
  who created it and you know that it has not been
  altered in any way since that person created it.
  These two processes, encryption and
  authentication, work hand-in-hand to create a
  secure environment.

More Related Content

PDF
PDF
S&Wweek12
PDF
s117
PPTX
Encryption
ODP
Week12
PPTX
Data Encryption : A Powerful and an Approachable Technology!
PDF
Week 12 slide
PPT
Encryption technology
S&Wweek12
s117
Encryption
Week12
Data Encryption : A Powerful and an Approachable Technology!
Week 12 slide
Encryption technology

Viewers also liked (20)

PDF
Hot Air Hand Tools
PPT
lecture_10
PDF
Driving Growth and Cutting Costs in 2010 with Online Collaboration
PDF
SheSpeaks Social Media Infographic
PPTX
Panellets
PDF
Millennial Mom's Eating Habits - Infographic Study
PPT
How to Make a Do-It-Yourself Storytime Cart
PPTX
Ilt in teaching and learning
PDF
Preview guide st852ifr1
PPT
Career Clusters
PDF
Elvis 2003 Close Up
PPTX
2. per una strategia digitale
PDF
Williams 2008 Short Exam On Pop Islam Beliefs
PPSX
Turner Lovell Overview
PPT
音乐摇摆可乐罐
PDF
Rppfiqihkelas7mtskurtilasedisirevisi 141126084558-conversion-gate01
PPT
郭新良 107081024 工业设计071(工)
PPTX
Teatre Bibliobus
PDF
‘WHAT CAN SOCIAL MEDIA DO TO MAKE SOCIAL GOOD BETTER?
Hot Air Hand Tools
lecture_10
Driving Growth and Cutting Costs in 2010 with Online Collaboration
SheSpeaks Social Media Infographic
Panellets
Millennial Mom's Eating Habits - Infographic Study
How to Make a Do-It-Yourself Storytime Cart
Ilt in teaching and learning
Preview guide st852ifr1
Career Clusters
Elvis 2003 Close Up
2. per una strategia digitale
Williams 2008 Short Exam On Pop Islam Beliefs
Turner Lovell Overview
音乐摇摆可乐罐
Rppfiqihkelas7mtskurtilasedisirevisi 141126084558-conversion-gate01
郭新良 107081024 工业设计071(工)
Teatre Bibliobus
‘WHAT CAN SOCIAL MEDIA DO TO MAKE SOCIAL GOOD BETTER?
Ad

Similar to Amazon (20)

PDF
PDF
Week12
PDF
How encryption works
PDF
PDF
Week 12 slide
PPTX
Cryptography
PDF
$ii7oi5i-12
PDF
Kadai1
PDF
How encryption works
PPTX
big data and Iot , its security part ,hoe yoy help this
PPT
Cryptography
ODP
Week12 b
PDF
week 12
PDF
How encryption works
PDF
Cryptointro
PDF
Group slide presentation week12
PPTX
Computer Introduction (Data Encryption)-Lecture05
PDF
PDF
Computer Security (Cryptography) Ch01
PDF
Eng Slide3
Week12
How encryption works
Week 12 slide
Cryptography
$ii7oi5i-12
Kadai1
How encryption works
big data and Iot , its security part ,hoe yoy help this
Cryptography
Week12 b
week 12
How encryption works
Cryptointro
Group slide presentation week12
Computer Introduction (Data Encryption)-Lecture05
Computer Security (Cryptography) Ch01
Eng Slide3
Ad

More from yuyatamaru (15)

PDF
Amazon
PDF
Amazonda
PDF
Amazonda
PDF
Amazonda
PDF
Amazonda
PDF
Amazonda
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
How Firefox Works
Amazon
Amazonda
Amazonda
Amazonda
Amazonda
Amazonda
Amazon
Amazon
Amazon
Amazon
Amazon
Amazon
Amazon
Amazon
How Firefox Works

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf

Amazon

  • 1. How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs). Information security is provided on computers and over the Internet by a variety of methods.
  • 2. • Security Encryption Systems • Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. • As long as both generals had the correct cipher, they could decode any message the other sent. • To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination. • Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack.
  • 3. • Computer encryption systems generally belong in one of two categories: • Symmetric-key encryption • Public-key encryption
  • 4. • Symmetric Key • Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. • In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. Caesar's Cipher • Julius Caesar also used a similar substitution technique, shifting three letters up. If he wanted to say "CROSSING THE RUBICON," for instance, he'd write down "FURVV LQJWK HUXEL FRQ" instead. As you can see, the text is also broken up into even groups in order to make the size of each word less obvious. • Think of it like this: You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.
  • 6. SSL and TLS • A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 7. Hashing Algorithm • The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.
  • 8. Authentication • As stated earlier, encryption is the process of taking all of the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Another process, authentication, is used to verify that the information comes from a trusted source. Basically, if information is "authentic," you know who created it and you know that it has not been altered in any way since that person created it. These two processes, encryption and authentication, work hand-in-hand to create a secure environment.