SlideShare a Scribd company logo
How Encryption Works

Introduction to How Encryption Works
Security Encryption Systems
Symmetric Key

Public Key Encryption
SSL and TLS
Introduction to How Encryption
             Works
When we use the Internet, we're not always just
clicking around and passively taking in
information, such as reading news articles or
blog posts -- a great deal of our time online
involves sending others our own information.
Ordering something over the Internet, whether
it's a book, a CD or anything else from an online
vendor, or signing up for an online account,
requires entering in a good deal of sensitive
personal information.
Security Encryption Systems


The Greek historian Plutarch wrote, for example,
about Spartan generals who sent and received
sensitive messages using a scytale, a thin
cylinder made out of wood. The general would
wrap a piece of parchment around the scytale and
write his message along its length.
Symmetric Key

 Each computer has a secret key that it can use to
encrypt a packet of information before it is sent
over the network to another computer.
Symmetric-key requires that you know which
computers will be talking to each other so you
can install the key on each one. Symmetric-key
encryption is essentially the same as a secret
code that each of the two computers must know
in order to decode the information. The code
provides the key to decoding the message.
Public Key Encryption

asymmetric-key encryption, public-key
encryption uses two different keys at once -- a
combination of a private key and a public key.
The private key is known only to your computer,
while the public key is given by your computer
to any computer that wants to communicate
securely with it. To decode an encrypted
message, a computer must use the public key,
provided by the originating computer, and its
own private key.
SSL and TLS

 You will notice that the "http" in the address line
is replaced with "https," and you should see a
small padlock in the status bar at the bottom of
the browser window. When you're accessing
sensitive information, such as an online bank
account or a payment transfer service like PayPal
or Google Checkout, chances are you'll see this
type of format change and know your
information will most likely pass along securely.
How Encryption Works

Introduction to How Encryption Works
Security Encryption Systems
Symmetric Key

Public Key Encryption
SSL and TLS
Introduction to How Encryption
             Works
When we use the Internet, we're not always just
clicking around and passively taking in
information, such as reading news articles or
blog posts -- a great deal of our time online
involves sending others our own information.
Ordering something over the Internet, whether
it's a book, a CD or anything else from an online
vendor, or signing up for an online account,
requires entering in a good deal of sensitive
personal information.
Security Encryption Systems


The Greek historian Plutarch wrote, for example,
about Spartan generals who sent and received
sensitive messages using a scytale, a thin
cylinder made out of wood. The general would
wrap a piece of parchment around the scytale and
write his message along its length.
Symmetric Key

 Each computer has a secret key that it can use to
encrypt a packet of information before it is sent
over the network to another computer.
Symmetric-key requires that you know which
computers will be talking to each other so you
can install the key on each one. Symmetric-key
encryption is essentially the same as a secret
code that each of the two computers must know
in order to decode the information. The code
provides the key to decoding the message.
Public Key Encryption

asymmetric-key encryption, public-key
encryption uses two different keys at once -- a
combination of a private key and a public key.
The private key is known only to your computer,
while the public key is given by your computer
to any computer that wants to communicate
securely with it. To decode an encrypted
message, a computer must use the public key,
provided by the originating computer, and its
own private key.
SSL and TLS

 You will notice that the "http" in the address line
is replaced with "https," and you should see a
small padlock in the status bar at the bottom of
the browser window. When you're accessing
sensitive information, such as an online bank
account or a payment transfer service like PayPal
or Google Checkout, chances are you'll see this
type of format change and know your
information will most likely pass along securely.

More Related Content

PDF
Sw2 week12
PDF
Eng Slide3
PDF
Homework1
PDF
Week 12 slide
PDF
Sw week12
PDF
PDF
S&Wweek12
PDF
Group slide presentation week12
Sw2 week12
Eng Slide3
Homework1
Week 12 slide
Sw week12
S&Wweek12
Group slide presentation week12

Similar to Week12 (20)

PDF
Eng Slide3
PDF
Eng Slide3
PDF
Week 12 slide
PDF
week 12
PDF
Week12
PDF
$ii7oi5i-12
PDF
PDF
How encryption works
PDF
Week12
ODP
Week12
PDF
How Encryption Works
PDF
Encryption
PDF
Amazon
PDF
Encryption
PDF
encryption
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
PDF
Amazon
Eng Slide3
Eng Slide3
Week 12 slide
week 12
Week12
$ii7oi5i-12
How encryption works
Week12
Week12
How Encryption Works
Encryption
Amazon
Encryption
encryption
Amazon
Amazon
Amazon
Amazon
Amazon
Ad

More from Shouta Yoshida (19)

PDF
Week13 b
PDF
Sw week12-b
PDF
Sw week12-b
PPTX
How rss works
PDF
How rss works
PDF
Week11 b
PDF
How rss works
PDF
Week11 b
PDF
How rss works
PPTX
Week11 b
PPTX
How rss works
PDF
How rss works
ODP
Sw week10 part1 b-1
PDF
Week11 b
PPTX
Presentation1
PPTX
Presentation2
PDF
S1190027 shouta yoshida
ODP
Sw week10 part1 b-1
PPTX
sw week10 part1-B.odp
Week13 b
Sw week12-b
Sw week12-b
How rss works
How rss works
Week11 b
How rss works
Week11 b
How rss works
Week11 b
How rss works
How rss works
Sw week10 part1 b-1
Week11 b
Presentation1
Presentation2
S1190027 shouta yoshida
Sw week10 part1 b-1
sw week10 part1-B.odp
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A comparative analysis of optical character recognition models for extracting...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Unlocking AI with Model Context Protocol (MCP)
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Diabetes mellitus diagnosis method based random forest with bat algorithm
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Advanced methodologies resolving dimensionality complications for autism neur...

Week12

  • 1. How Encryption Works Introduction to How Encryption Works Security Encryption Systems Symmetric Key Public Key Encryption SSL and TLS
  • 2. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 3. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length.
  • 4. Symmetric Key Each computer has a secret key that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. Public Key Encryption asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
  • 6. SSL and TLS You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.
  • 7. How Encryption Works Introduction to How Encryption Works Security Encryption Systems Symmetric Key Public Key Encryption SSL and TLS
  • 8. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 9. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length.
  • 10. Symmetric Key Each computer has a secret key that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 11. Public Key Encryption asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
  • 12. SSL and TLS You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.