SlideShare a Scribd company logo
How Encryption for Strong
            Security Works
●   File Encryption
●   Data Encryption
●   Link Encryption
●   VPN          ●    s1170087 Shingo Watanabe
                 ●    s1170069 Ryohei Suda
                 ●    s1170067 Takahiro Shinkai
                 ●    s1170070 Shuhei Takahashi
File Encryption
        File encryption is
        encrypting files to
        protect the files from
        being read or changing
        without an encryption
        key.
        There are many
        algorithm.
Data Encrypion
–   Hidding data to other users,
    an encryption program uses      Hidding data to other users,
    a key witch is a string of
    numbers. The real data is
    encorded to stream using the
    key. It stream conbine
    pseudorandom stream. The
    ral data is bured in the
    pseudorandom “noise.”
–   This is Data Encrypion. It is
    used for UNIX passward.
Link Encryption
Link encryption is an approach to
communications security that encrypts and
decrypts all traffic at each end of a
communications line.
VPN
●   The purpose of a VPN
    is to allow
    communications
    between systems
    connected to the VPN
    using an existing
    shared network
    network infrastructure
    as the transport.
References
●   @IT
    http://www.atmarkit.co.jp/fsecurity/dictionary/indexpa
●   Wikipedia
    –   http://en.wikipedia.org/wiki/Main_Page

More Related Content

PDF
Week13
PDF
Week13presen
PDF
Week13
PDF
Week13presentation
ODP
Web Presentation 13
ODP
Week13 Presen
PDF
Web Presen
PDF
Gwp Week13
 
Week13
Week13presen
Week13
Week13presentation
Web Presentation 13
Week13 Presen
Web Presen
Gwp Week13
 

What's hot (20)

ODP
Week12 b
PDF
Week13
PDF
Week 12 slide
PPT
Data encryption-ciphers
PDF
How Encryption Works
PPTX
Encryption
PDF
PDF
Encode club introduction_to_libp2p
PDF
Week13 presentation
PPTX
Public key encryption presentation
PDF
Group slide presentation week12
PPTX
Encrytion ppt
PPTX
Ssl certificate in internet world
PDF
RFC 7435 - Opportunistic security - Some protection most of the time
PPT
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
PPTX
Heartbleed Bug: A case study
PDF
Eng12
PPTX
Network Security and Cryptography
PPTX
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
PPTX
online game over cryptography
Week12 b
Week13
Week 12 slide
Data encryption-ciphers
How Encryption Works
Encryption
Encode club introduction_to_libp2p
Week13 presentation
Public key encryption presentation
Group slide presentation week12
Encrytion ppt
Ssl certificate in internet world
RFC 7435 - Opportunistic security - Some protection most of the time
Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017
Heartbleed Bug: A case study
Eng12
Network Security and Cryptography
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
online game over cryptography
Ad

Viewers also liked (8)

PDF
How Media Convergence Works
PPTX
Oil&Gas.Eng.Doc
PPTX
PDF
RICS Property World pgs5 8
PPT
Intro To The Valuation Council Final
PPTX
What is Social Media
PPTX
Social media 401
PDF
How Network Management Systems Work
How Media Convergence Works
Oil&Gas.Eng.Doc
RICS Property World pgs5 8
Intro To The Valuation Council Final
What is Social Media
Social media 401
How Network Management Systems Work
Ad

Similar to How Encryption for Strong Security Works (20)

PDF
How Encryption For Strong Security Works
PDF
Week13
PDF
Security F
ODP
Week13
PDF
Week13
PDF
Week13
ODP
Week13
PDF
Week13 Slides
PDF
Week13 Slides
PDF
Week13 Slides
PDF
Week13
PDF
Week13
PDF
Homework4
PPT
ch07.ppt
PDF
PDF
Gps4b
PDF
Week13 - Group Presentation Slide
PDF
Gps4b
PDF
How encryption works
PPT
Network Security and Cryptography
How Encryption For Strong Security Works
Week13
Security F
Week13
Week13
Week13
Week13
Week13 Slides
Week13 Slides
Week13 Slides
Week13
Week13
Homework4
ch07.ppt
Gps4b
Week13 - Group Presentation Slide
Gps4b
How encryption works
Network Security and Cryptography

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx

How Encryption for Strong Security Works

  • 1. How Encryption for Strong Security Works ● File Encryption ● Data Encryption ● Link Encryption ● VPN ● s1170087 Shingo Watanabe ● s1170069 Ryohei Suda ● s1170067 Takahiro Shinkai ● s1170070 Shuhei Takahashi
  • 2. File Encryption File encryption is encrypting files to protect the files from being read or changing without an encryption key. There are many algorithm.
  • 3. Data Encrypion – Hidding data to other users, an encryption program uses Hidding data to other users, a key witch is a string of numbers. The real data is encorded to stream using the key. It stream conbine pseudorandom stream. The ral data is bured in the pseudorandom “noise.” – This is Data Encrypion. It is used for UNIX passward.
  • 4. Link Encryption Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line.
  • 5. VPN ● The purpose of a VPN is to allow communications between systems connected to the VPN using an existing shared network network infrastructure as the transport.
  • 6. References ● @IT http://www.atmarkit.co.jp/fsecurity/dictionary/indexpa ● Wikipedia – http://en.wikipedia.org/wiki/Main_Page