SlideShare a Scribd company logo
How Encryption for
     Strong Security Works
●
  What is the Encryption?
●
  The Purpose
●
  Enumeration of kinds
●
  Difference of the past and present
What is the Encryption?
Encryption is the process of
transforming information (referred to
as plaintext)using
an algorithm (called cipher)
to make it
unreadable.
The Purpose
To anyone except those
possessing special knowledge,
usually referred
to as a key.
Enumeration of kinds



●
  [**aza] type code
●
  Transposition type code
●
  Symmetric-key encryption
●
  Public key cryptosystem
Difference of the past and present

 Today's encryption is complex as
 the technology grows up though
 is very much the
 change with an
 ancient encryption
 form.
References

●
    http://en.wikipedia.org/

●
    http://library.thinkquest.org/27158/history.html

More Related Content

PDF
Sw2 b12
PPTX
Encryption
PPTX
Encryption presentation(self made
ODP
2008 07-17-nnedv-presentation
PDF
PPT
Securityand encryption
PPT
cryptography deepan fav subject
PPTX
Firewall
Sw2 b12
Encryption
Encryption presentation(self made
2008 07-17-nnedv-presentation
Securityand encryption
cryptography deepan fav subject
Firewall

What's hot (16)

PDF
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
PPTX
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
PDF
Cryto Party at CCU
PDF
Crypto OpSec - How to Securely Store Bitcoin and Other Crypto Assets
PDF
How Encryption for Strong Security Works
PDF
How encryption works
ODP
Lockpicking and Lockpsort - Bsides Ljubljana (2019)
PDF
GCCS-Unplugged Secure and private communication and collaboration
PPTX
Introduction to Cryptography Training – Level 1
PDF
PDF
Weaponization of IoT
PPTX
Hacking its types and the art of exploitation
PDF
Week11
PPT
Security Systems for Digital Data
PDF
Security Systems for Digital Data - Paper
PDF
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Seyfullah Kilic - Hacking Cryptocurrency Miners with OSINT Techniques
Cryto Party at CCU
Crypto OpSec - How to Securely Store Bitcoin and Other Crypto Assets
How Encryption for Strong Security Works
How encryption works
Lockpicking and Lockpsort - Bsides Ljubljana (2019)
GCCS-Unplugged Secure and private communication and collaboration
Introduction to Cryptography Training – Level 1
Weaponization of IoT
Hacking its types and the art of exploitation
Week11
Security Systems for Digital Data
Security Systems for Digital Data - Paper
Ad

Viewers also liked (13)

PDF
ผลสัมฤทธิ์ทางการเรียน 53
PDF
How Encryption for Strong Security Works
PPTX
Հաշվետվություն 2-րդ կիսամյակ
PPTX
Christmass party
PPT
Անհավասարումներ
PDF
บทเรียน เรื่องอินเตอร์เน็ต
PDF
How To Build A Email List Listbuilders free
DOCX
մաթեմատիկան առօրյա կյանքում
PPT
Առանցքային և կենտրոնային համաչափություն
PPT
New pengurusan sumber manusia (2)
PPT
اساسيات انقاذ الحياة والاسعافات الاولية الدكتور يوسف الطيب مارس 2013
PPS
Անկյուններ
ผลสัมฤทธิ์ทางการเรียน 53
How Encryption for Strong Security Works
Հաշվետվություն 2-րդ կիսամյակ
Christmass party
Անհավասարումներ
บทเรียน เรื่องอินเตอร์เน็ต
How To Build A Email List Listbuilders free
մաթեմատիկան առօրյա կյանքում
Առանցքային և կենտրոնային համաչափություն
New pengurusan sumber manusia (2)
اساسيات انقاذ الحياة والاسعافات الاولية الدكتور يوسف الطيب مارس 2013
Անկյուններ
Ad

Similar to Group Presentation Slide Week13 (20)

PPTX
PresentationonCRYPTOGRAPHY.pptx
PDF
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
PPTX
groupWork.pptx
PPTX
FPGA-Based Security Solutions & Specific security goals of cryptography
PDF
CSE-CRYPTOGRAPHY-presentation-in-ppt format
PPTX
Detailed description about the concept of E Commerce UNIT IV.pptx
PPTX
P2-L5+Intro+to+Cryptography+-+Script.pptx
PPTX
Encrytion ppt
PDF
Cryptology - The practice and study of hiding information
PPTX
PPT
PPTX
Introduction to cryptography part1-final
PPTX
CRYPTOGRAPHY and its applications .pptx
PPTX
Encyption-Presentation at Saint Johns UnivesityT.pptx
PPTX
Cryptography
PPTX
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
PPTX
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
PDF
Information Security 05- Encryption.pdfn
PDF
Eng12
PPT
Info security & crypto
PresentationonCRYPTOGRAPHY.pptx
Data Science Unit 02 SPPU Sem 6 PPT-2.pdf
groupWork.pptx
FPGA-Based Security Solutions & Specific security goals of cryptography
CSE-CRYPTOGRAPHY-presentation-in-ppt format
Detailed description about the concept of E Commerce UNIT IV.pptx
P2-L5+Intro+to+Cryptography+-+Script.pptx
Encrytion ppt
Cryptology - The practice and study of hiding information
Introduction to cryptography part1-final
CRYPTOGRAPHY and its applications .pptx
Encyption-Presentation at Saint Johns UnivesityT.pptx
Cryptography
CRYPTOGRAPHY IN CLOUD COMPUTING Presentation
Rishav kumar(cryptography).pptxgzgzgsggsgsgzg
Information Security 05- Encryption.pdfn
Eng12
Info security & crypto

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
A comparative analysis of optical character recognition models for extracting...
Group 1 Presentation -Planning and Decision Making .pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25-Week II
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
SOPHOS-XG Firewall Administrator PPT.pptx
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx

Group Presentation Slide Week13

  • 1. How Encryption for Strong Security Works ● What is the Encryption? ● The Purpose ● Enumeration of kinds ● Difference of the past and present
  • 2. What is the Encryption? Encryption is the process of transforming information (referred to as plaintext)using an algorithm (called cipher) to make it unreadable.
  • 3. The Purpose To anyone except those possessing special knowledge, usually referred to as a key.
  • 4. Enumeration of kinds ● [**aza] type code ● Transposition type code ● Symmetric-key encryption ● Public key cryptosystem
  • 5. Difference of the past and present Today's encryption is complex as the technology grows up though is very much the change with an ancient encryption form.
  • 6. References ● http://en.wikipedia.org/ ● http://library.thinkquest.org/27158/history.html