SlideShare a Scribd company logo
How Encryption for String Security Works ・ VPN ・ Data encryption ・ Router ・ Advanced Encryption
VPN A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
Data encryption The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor.
Router Routers distribute digital information that is contained within a data packet. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network type to another.
Advanced Encryption In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively.
Reference Wikipedia http://en.wikipedia.org/

More Related Content

ODP
Week13
PPTX
Nsa suite b
PDF
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
PPTX
online game over cryptography
ODP
Week13
PPTX
Network Security(Symmetric Ciphers)
PPTX
PROTOCOL MECHNISM FOR SECURITY ppt
PDF
s117
Week13
Nsa suite b
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
online game over cryptography
Week13
Network Security(Symmetric Ciphers)
PROTOCOL MECHNISM FOR SECURITY ppt
s117

What's hot (18)

PDF
Week 12 slide
PDF
How encryption works
PDF
presenw13
PPTX
Network security & cryptography
ODP
Week12 b
PDF
Encrypted Databases for Untrusted Cloud
PPTX
fundamental of network security
PDF
How encryption works
PDF
Week13
PDF
Group slide presentation week12
ODP
Week13
PPT
Lesson 1- Foundation of Cryptology
PDF
Cscu module 04 data encryption
PDF
Five steps to secure big data
PPTX
Cryptography and attacks ins
PDF
How Encryption Works
PPT
Protecting Sensitive Data using Encryption and Key Management
Week 12 slide
How encryption works
presenw13
Network security & cryptography
Week12 b
Encrypted Databases for Untrusted Cloud
fundamental of network security
How encryption works
Week13
Group slide presentation week12
Week13
Lesson 1- Foundation of Cryptology
Cscu module 04 data encryption
Five steps to secure big data
Cryptography and attacks ins
How Encryption Works
Protecting Sensitive Data using Encryption and Key Management
Ad

Viewers also liked (14)

PPT
Powerpoint presentation
PPT
Twitter voor #beginners
PDF
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
PDF
Narby, jeremy kozmicka zmija (dnk i podrijetlo znanja)
PPTX
Cerita tukang pintu
DOC
Knuc internship-form- winter 2015-doc
PDF
KNUC Research Publication on Reform Indian Economic Policy
PPTX
7 ingredientai g
PDF
Vek.od.ua Публичные выступления Войтко
PDF
Out of control: Failure.
PPTX
Mexicanos p5
PDF
How to use Social Media 4 Business (squidoo lens)
PPTX
About my blog
Powerpoint presentation
Twitter voor #beginners
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
Narby, jeremy kozmicka zmija (dnk i podrijetlo znanja)
Cerita tukang pintu
Knuc internship-form- winter 2015-doc
KNUC Research Publication on Reform Indian Economic Policy
7 ingredientai g
Vek.od.ua Публичные выступления Войтко
Out of control: Failure.
Mexicanos p5
How to use Social Media 4 Business (squidoo lens)
About my blog
Ad

Similar to Week13 (20)

PPTX
LAN's by Group 1
PDF
Data Encryption Standard
PDF
Review on variants of Security aware AODV
PDF
Advanced Encryption Standard (AES) with Dynamic Substitution Box
PPTX
Encryption techniques
PDF
B03302007012
PDF
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
DOCX
Data encryption standard
PPTX
Encryption And Decryption Using AES Algorithm
PDF
Hybrid AES DES
PPTX
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
PPT
Ch11 Basic Cryptography
PDF
Week13presen
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
DOCX
AES Abstract
DOC
Network security
PPTX
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
PDF
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
PPTX
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
LAN's by Group 1
Data Encryption Standard
Review on variants of Security aware AODV
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Encryption techniques
B03302007012
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Data encryption standard
Encryption And Decryption Using AES Algorithm
Hybrid AES DES
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
Ch11 Basic Cryptography
Week13presen
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
AES Abstract
Network security
CRYPTOGRAPHY_DOS_Symmetric-Key Cryptography.pptx
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx

Week13

  • 1. How Encryption for String Security Works ・ VPN ・ Data encryption ・ Router ・ Advanced Encryption
  • 2. VPN A virtual private network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
  • 3. Data encryption The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor.
  • 4. Router Routers distribute digital information that is contained within a data packet. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network type to another.
  • 5. Advanced Encryption In cryptography, the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each of these ciphers has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively.