How Encryption Works
When we use the Internet, we're not always just
clicking around and passively taking in
information, such as reading news articles or blog
posts -- a great deal of our time online involves
sending others our own information.
A typical transaction might include not only our
names, e-mail addresses and physical address and
phone number, but also passwords and personal
identification numbers (PINs).
Information security is provided on computers and
over the Internet by a variety of methods.
• Security Encryption Systems
• Computer encryption is based on the science of
cryptography, which has been used as long as
humans have wanted to keep information secret.
• As long as both generals had the correct cipher,
they could decode any message the other sent.
• To make the message more difficult to decipher,
they could arrange the letters inside the grid in any
combination.
• Most forms of cryptography in use these days rely
on computers, simply because a human-based
code is too easy for a computer to crack.
• Computer encryption systems generally belong
in one of two categories:
• Symmetric-key encryption
• Public-key encryption
• Symmetric Key
• Just like two Spartan generals sending messages to each
other, computers using symmetric-key encryption to send
information between each other must have the same key.
• In symmetric-key encryption, each computer has a secret
key (code) that it can use to encrypt a packet of
information before it is sent over the network to another
computer. Symmetric-key requires that you know which
computers will be talking to each other so you can install
the key on each one. Symmetric-key encryption is
essentially the same as a secret code that each of the two
computers must know in order to decode the information.
The code provides the key to decoding the message.
Caesar's Cipher
• Julius Caesar also used a similar substitution technique,
shifting three letters up. If he wanted to say "CROSSING
THE RUBICON," for instance, he'd write down "FURVV
LQJWK HUXEL FRQ" instead. As you can see, the text is
also broken up into even groups in order to make the size
of each word less obvious.
• Think of it like this: You create a coded message to send to
a friend in which each letter is substituted with the letter
that is two down from it in the alphabet. So "A" becomes
"C," and "B" becomes "D". You have already told a trusted
friend that the code is "Shift by 2". Your friend gets the
message and decodes it. Anyone else who sees the
message will see only nonsense.
SSL and TLS
• A popular implementation of public-key
encryption is the Secure Sockets Layer
(SSL). Originally developed by Netscape,
SSL is an Internet security protocol used by
Internet browsers and Web servers to
transmit sensitive information. SSL has
become part of an overall security protocol
known as Transport Layer Security (TLS).
Hashing Algorithm
• The key in public-key encryption is based
on a hash value. This is a value that is
computed from a base input number using a
hashing algorithm. Essentially, the hash
value is a summary of the original value.
The important thing about a hash value is
that it is nearly impossible to derive the
original input number without knowing the
data used to create the hash value.
Authentication
• As stated earlier, encryption is the process of
taking all of the data that one computer is sending
to another and encoding it into a form that only the
other computer will be able to decode. Another
process, authentication, is used to verify that the
information comes from a trusted source.
Basically, if information is "authentic," you know
who created it and you know that it has not been
altered in any way since that person created it.
These two processes, encryption and
authentication, work hand-in-hand to create a
secure environment.

More Related Content

PDF
PDF
Homework1
PDF
S&Wweek12
PPTX
Encryption
PPT
Encryption technology
PPTX
Data Encryption : A Powerful and an Approachable Technology!
PDF
Week 12 slide
PDF
Eng Slide3
Homework1
S&Wweek12
Encryption
Encryption technology
Data Encryption : A Powerful and an Approachable Technology!
Week 12 slide
Eng Slide3

What's hot (6)

PPTX
Cryptography
PDF
CyberGhost VPN Encryption Guide
PPT
Cryptography ppt
PPT
Cryptography
PDF
s117
ODP
Week12
Cryptography
CyberGhost VPN Encryption Guide
Cryptography ppt
Cryptography
s117
Week12
Ad

Viewers also liked (20)

PDF
JRuby - The Perfect Alternative
PPT
Adm Team3 Duo 기말 Final V.2.0 091201
PPTX
E-Business 17 02
PPT
Penerjemahan Teks Teknologi Informasi
KEY
Pack the Park
DOC
RPforEUH2031
PPTX
Anxiety Presentation
PDF
Individual sections development exercise #5
PPT
весна
PDF
DigiPharmaX 2016 - India's 1st Pharma Digital Excellence Awards
PPS
CIM Digital Bootcamp - Introduction to Social Media
PPT
Shabnam
PDF
Individual sections development exercise #4
PDF
Hadoop Enterprise Readiness
PPT
Politika Industriale E Ue
PPT
Music Magazine Evaluation
PPT
Diana And Lizeth`S Project
PPTX
Starting the Conversation about Feedback
PPTX
Hola !!!
JRuby - The Perfect Alternative
Adm Team3 Duo 기말 Final V.2.0 091201
E-Business 17 02
Penerjemahan Teks Teknologi Informasi
Pack the Park
RPforEUH2031
Anxiety Presentation
Individual sections development exercise #5
весна
DigiPharmaX 2016 - India's 1st Pharma Digital Excellence Awards
CIM Digital Bootcamp - Introduction to Social Media
Shabnam
Individual sections development exercise #4
Hadoop Enterprise Readiness
Politika Industriale E Ue
Music Magazine Evaluation
Diana And Lizeth`S Project
Starting the Conversation about Feedback
Hola !!!
Ad

Similar to Ss (20)

PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Encryption
PDF
Amazon
PDF
Amazon
PDF
encryption
PDF
Amazon
PDF
Amazon
PDF
Week12
PDF
How encryption works
PDF
Week 12 slide
PDF
PDF
Kadai1
PDF
$ii7oi5i-12
PDF
How encryption works
PDF
PDF
Eng Slide3
Amazon
Amazon
Amazon
Amazon
Amazon
Encryption
Amazon
Amazon
encryption
Amazon
Amazon
Week12
How encryption works
Week 12 slide
Kadai1
$ii7oi5i-12
How encryption works
Eng Slide3

More from yuyatamaru (7)

PDF
Amazon
PDF
Amazonda
PDF
Amazonda
PDF
Amazonda
PDF
Amazonda
PDF
Amazonda
PDF
How Firefox Works
Amazon
Amazonda
Amazonda
Amazonda
Amazonda
Amazonda
How Firefox Works

Recently uploaded (20)

PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Five Habits of High-Impact Board Members
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Modernising the Digital Integration Hub
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
sustainability-14-14877-v2.pddhzftheheeeee
Build Your First AI Agent with UiPath.pptx
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Five Habits of High-Impact Board Members
Microsoft Excel 365/2024 Beginner's training
The influence of sentiment analysis in enhancing early warning system model f...
Module 1.ppt Iot fundamentals and Architecture
Taming the Chaos: How to Turn Unstructured Data into Decisions
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
2018-HIPAA-Renewal-Training for executives
Developing a website for English-speaking practice to English as a foreign la...
Zenith AI: Advanced Artificial Intelligence
A contest of sentiment analysis: k-nearest neighbor versus neural network
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Modernising the Digital Integration Hub
TEXTILE technology diploma scope and career opportunities
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
What is a Computer? Input Devices /output devices
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A review of recent deep learning applications in wood surface defect identifi...

Ss

  • 1. How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs). Information security is provided on computers and over the Internet by a variety of methods.
  • 2. • Security Encryption Systems • Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. • As long as both generals had the correct cipher, they could decode any message the other sent. • To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination. • Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack.
  • 3. • Computer encryption systems generally belong in one of two categories: • Symmetric-key encryption • Public-key encryption
  • 4. • Symmetric Key • Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. • In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. Caesar's Cipher • Julius Caesar also used a similar substitution technique, shifting three letters up. If he wanted to say "CROSSING THE RUBICON," for instance, he'd write down "FURVV LQJWK HUXEL FRQ" instead. As you can see, the text is also broken up into even groups in order to make the size of each word less obvious. • Think of it like this: You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.
  • 6. SSL and TLS • A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 7. Hashing Algorithm • The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.
  • 8. Authentication • As stated earlier, encryption is the process of taking all of the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Another process, authentication, is used to verify that the information comes from a trusted source. Basically, if information is "authentic," you know who created it and you know that it has not been altered in any way since that person created it. These two processes, encryption and authentication, work hand-in-hand to create a secure environment.