SlideShare a Scribd company logo
How Encryption Works




  s1170008 Yuya Otsuka
1. Introduction to How Encryption
                Works

   The incredible growth of the Internet has
excited businesses and consumers alike with its
promise of changing the way we live and work.
   It's extremely easy to buy and sell goods all
over the world while sitting in front of a laptop.
   But security is a major concern on the Internet,
especially when you're using it to send sensitive
information between parties.
2. Security Encryption Systems



Computer encryption is based on the science of
 cryptography, which has been used as long as
humans have wanted to keep information secret.
           A Greek used a code first.
3. Symmetric Key



In symmetric-key encryption, each computer has
 a secret key (code) that it can use to encrypt a
  packet of information before it is sent over the
          network to another computer.
4. Public Key Encryption


Also known as asymmetric-key encryption, public-
key encryption uses two different keys at once -- a
  combination of a private key and a public key.
 The private key is known only to your computer,
 while the public key is given by your computer to
any computer that wants to communicate securely
                       with it.
5. SSL and TLS

● SSL(Secure Sockets Layer)
● TLS(Transport Layer Security)




 Originally developed by Netscape, SSL is an
   Internet security protocol used by Internet
browsers and Web servers to transmit sensitive
                   information.
6. Authentication




Basically, if information is "authentic," you know
who created it and you know that it has not been
 altered in any way since that person created it.

More Related Content

PDF
How Encryption Works
PDF
Eng12
PDF
$ii7oi5i-12
PDF
How encryption works
PDF
Week 12 slide
PDF
How encryption works
PDF
PDF
week 12
How Encryption Works
Eng12
$ii7oi5i-12
How encryption works
Week 12 slide
How encryption works
week 12

What's hot (15)

PDF
Sw2 b12
PDF
SW Week12
PPT
A+ Update Endpoint Encryption
PDF
Sp W12
PPTX
online game over cryptography
PDF
How encryption work
PDF
s117
PPT
How to secure data in Mac
PPT
Cryptography intro
PPT
Securing Your Data In The Cloud
PDF
CipherLoc_OverviewBrochure (1)
PDF
How encryption works
PPTX
Cryptography
PDF
Week13
ODP
Week13
Sw2 b12
SW Week12
A+ Update Endpoint Encryption
Sp W12
online game over cryptography
How encryption work
s117
How to secure data in Mac
Cryptography intro
Securing Your Data In The Cloud
CipherLoc_OverviewBrochure (1)
How encryption works
Cryptography
Week13
Week13
Ad

Similar to Week11 (20)

ODP
Week12
ODP
Week12
ODP
Week12
PDF
Week 12 slide
PDF
Encryption
ODP
Week12 b
PDF
Kadai1
PDF
S&Wweek12
PDF
How Encryption Works
PDF
Sw week12
PDF
Week12
PDF
Week12
PDF
PDF
Group slide presentation week12
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
Cryptointro
ODP
Week12
PPTX
Cyber security
PDF
cryptography
PDF
L017136269
Week12
Week12
Week12
Week 12 slide
Encryption
Week12 b
Kadai1
S&Wweek12
How Encryption Works
Sw week12
Week12
Week12
Group slide presentation week12
International Refereed Journal of Engineering and Science (IRJES)
Cryptointro
Week12
Cyber security
cryptography
L017136269
Ad

More from 0008yuya (20)

PDF
PDF
PDF
Week7
PDF
Week6
PDF
Week5
PDF
Week4
PDF
Ex3 eng
PDF
Presentation1
PDF
Presentation1
PDF
PDF
Presentation1
PDF
Presentation1
PDF
English 2
PDF
English
PDF
English
PDF
Awpm cmap
PDF
Group iii
PDF
Group g
PDF
無題 1
PDF
無題 1
Week7
Week6
Week5
Week4
Ex3 eng
Presentation1
Presentation1
Presentation1
Presentation1
English 2
English
English
Awpm cmap
Group iii
Group g
無題 1
無題 1

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
August Patch Tuesday
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Tartificialntelligence_presentation.pptx
Machine Learning_overview_presentation.pptx
A Presentation on Artificial Intelligence
August Patch Tuesday
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
OMC Textile Division Presentation 2021.pptx
MIND Revenue Release Quarter 2 2025 Press Release
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
TLE Review Electricity (Electricity).pptx
cloud_computing_Infrastucture_as_cloud_p
gpt5_lecture_notes_comprehensive_20250812015547.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
A comparative analysis of optical character recognition models for extracting...
Tartificialntelligence_presentation.pptx

Week11

  • 1. How Encryption Works s1170008 Yuya Otsuka
  • 2. 1. Introduction to How Encryption Works The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop. But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.
  • 3. 2. Security Encryption Systems Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. A Greek used a code first.
  • 4. 3. Symmetric Key In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer.
  • 5. 4. Public Key Encryption Also known as asymmetric-key encryption, public- key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it.
  • 6. 5. SSL and TLS ● SSL(Secure Sockets Layer) ● TLS(Transport Layer Security) Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information.
  • 7. 6. Authentication Basically, if information is "authentic," you know who created it and you know that it has not been altered in any way since that person created it.