Cryptography and  By Marco Antonio Ordoñez Contreras 1412474
What is the cryptography? The cryptography is the science of using the mathematics to encrypt and desencriptar information. As soon as the information has been encrypted, it can be stored in a way insecure or sent across an insecure network (as Internet) and nonetheless to remain secret. Then, the information can desencriptarse to his original format.
What is the process of encriptación and desencriptación? The encriptación is the process in which the information to protecting is translated into something that seems to be random and that does not have any meaning (the encrypted or ciphered information). The desencriptación is the process into which the encrypted information is converted again to his original form.
What is a cryptographic algorithm? A cryptographic algorithm, or person who writes in cipher, is a mathematical function used in the processes of encriptación and desencriptación. A cryptographic algorithm is employed at combination with a key (a number, word, phrase, or password) to encrypt and desencriptar information.
To encrypt, the algorithm combines mathematically the information to protecting with a provided key.
The result of this calculation it is the encrypted information. For desencriptar, the algorithm does a calculation combining the information encrypted with a provided key, being the result of this combination the information desencriptados. If the key or the information are modified the algorithm it produces a different result.
What differences are between the symmetrical algorithms and the asymmetric ones? The symmetrical algorithms encrypt and desencriptan with the same key. The principal advantages of the symmetrical algorithms are his safety and his speed.

More Related Content

ODP
Encriptacion
ODP
Encriptacion
PPTX
Encryption ppt
PPTX
Encryption
PPTX
Security Mechanisms
PPTX
Network Security and Cryptography
PPTX
Symmetric and Asymmetric Encryption
Encriptacion
Encriptacion
Encryption ppt
Encryption
Security Mechanisms
Network Security and Cryptography
Symmetric and Asymmetric Encryption

What's hot (19)

PPTX
PPTX
Cryptography and attacks ins
DOCX
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PDF
How Encryption Works
PPTX
PDF
Bachelor Studies Project Details
PDF
How encryption works
PPTX
PPTX
Steganography on Cloud - Cloud Computing
PPTX
Coding And Decoding
PDF
ijircee_Template
PPTX
Encrytion ppt
PDF
PPT
Information and data security key management and distribution
DOCX
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
PPT
Lesson 1- Foundation of Cryptology
DOCX
Course outlines
PPT
A+ Update Endpoint Encryption
Cryptography and attacks ins
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF...
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
How Encryption Works
Bachelor Studies Project Details
How encryption works
Steganography on Cloud - Cloud Computing
Coding And Decoding
ijircee_Template
Encrytion ppt
Information and data security key management and distribution
AN EFFICIENT AND FINE-GRAINED BIG DATA ACCESSCONTROL SCHEME WITH PRIVACY-PRES...
Lesson 1- Foundation of Cryptology
Course outlines
A+ Update Endpoint Encryption
Ad

Viewers also liked (15)

PPTX
Network.h
ODP
Nach os network
ODP
Security
ODP
ODP
ODP
Clock
ODP
Sockets in nach0s
ODP
Nach os network
ODP
Sockets
PDF
User-Generated Content Campaigns: The Three Keys to Success
ODP
Nach os network
ODP
Semaphore
ODP
ODP
ODP
Semaphore
Network.h
Nach os network
Security
Clock
Sockets in nach0s
Nach os network
Sockets
User-Generated Content Campaigns: The Three Keys to Success
Nach os network
Semaphore
Semaphore
Ad

Similar to Encriptacion (20)

PPTX
Chapter 5 - Enkripsi dan Kriptograpi.pptx
DOCX
Seminar report on symmetric key
PPT
Cyber security Unit 3 Cryptography and Network security
PDF
Computer Security (Cryptography) Ch01
PPTX
Cryptography & Network Security.pptx
PPT
Fundamentals of cryptography
PDF
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
PPTX
Data encryption
PPT
Information Security
PPTX
IS-cryptograpy algorithms.pptx
PDF
The effect of Encryption algorithms Delay on TCP Traffic over data networks
PDF
O017128591
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Public key cryptography
PDF
Iaetsd a survey on cloud storage security with
PDF
L017136269
PDF
Comparison of Various Encryption Algorithms and Techniques for improving secu...
DOC
DOCS ON NETWORK SECURITY
PPT
Elementry Cryptography
Chapter 5 - Enkripsi dan Kriptograpi.pptx
Seminar report on symmetric key
Cyber security Unit 3 Cryptography and Network security
Computer Security (Cryptography) Ch01
Cryptography & Network Security.pptx
Fundamentals of cryptography
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Data encryption
Information Security
IS-cryptograpy algorithms.pptx
The effect of Encryption algorithms Delay on TCP Traffic over data networks
O017128591
International Journal of Engineering Research and Development (IJERD)
Public key cryptography
Iaetsd a survey on cloud storage security with
L017136269
Comparison of Various Encryption Algorithms and Techniques for improving secu...
DOCS ON NETWORK SECURITY
Elementry Cryptography

Recently uploaded (20)

DOCX
search engine optimization ppt fir known well about this
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Modernising the Digital Integration Hub
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hybrid model detection and classification of lung cancer
PPT
Geologic Time for studying geology for geologist
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Architecture types and enterprise applications.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
The various Industrial Revolutions .pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Unlock new opportunities with location data.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
search engine optimization ppt fir known well about this
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
observCloud-Native Containerability and monitoring.pptx
Modernising the Digital Integration Hub
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Getting started with AI Agents and Multi-Agent Systems
Hybrid model detection and classification of lung cancer
Geologic Time for studying geology for geologist
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Enhancing emotion recognition model for a student engagement use case through...
A novel scalable deep ensemble learning framework for big data classification...
Architecture types and enterprise applications.pdf
Zenith AI: Advanced Artificial Intelligence
O2C Customer Invoices to Receipt V15A.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
The various Industrial Revolutions .pptx
Developing a website for English-speaking practice to English as a foreign la...
NewMind AI Weekly Chronicles – August ’25 Week III
Unlock new opportunities with location data.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Encriptacion

  • 1. Cryptography and By Marco Antonio Ordoñez Contreras 1412474
  • 2. What is the cryptography? The cryptography is the science of using the mathematics to encrypt and desencriptar information. As soon as the information has been encrypted, it can be stored in a way insecure or sent across an insecure network (as Internet) and nonetheless to remain secret. Then, the information can desencriptarse to his original format.
  • 3. What is the process of encriptación and desencriptación? The encriptación is the process in which the information to protecting is translated into something that seems to be random and that does not have any meaning (the encrypted or ciphered information). The desencriptación is the process into which the encrypted information is converted again to his original form.
  • 4. What is a cryptographic algorithm? A cryptographic algorithm, or person who writes in cipher, is a mathematical function used in the processes of encriptación and desencriptación. A cryptographic algorithm is employed at combination with a key (a number, word, phrase, or password) to encrypt and desencriptar information.
  • 5. To encrypt, the algorithm combines mathematically the information to protecting with a provided key.
  • 6. The result of this calculation it is the encrypted information. For desencriptar, the algorithm does a calculation combining the information encrypted with a provided key, being the result of this combination the information desencriptados. If the key or the information are modified the algorithm it produces a different result.
  • 7. What differences are between the symmetrical algorithms and the asymmetric ones? The symmetrical algorithms encrypt and desencriptan with the same key. The principal advantages of the symmetrical algorithms are his safety and his speed.
  • 8. The asymmetric algorithms encrypt and desencriptan with different keys. The information is encrypted by a public key and desencriptan by a private road, being this one his principal advantage. The asymmetric algorithms, also known as algorithms of public key, need at least a key of 3.000 bits to reach a level of similar safety to of the symmetrical one of 128 bits. And they are incredibly slow, so much that cannot be used to encrypt big quantities of information.