際際滷

際際滷Share a Scribd company logo
Introduction to How Encryption
               Works
When we use the Internet, we're not always just
       clicking around and passively taking in
   information, such as reading news articles or
     blog posts -- a great deal of our time online
   involves sending others our own information.
  Ordering something over the Internet, whether
it's a book, a CD or anything else from an online
    vendor, or signing up for an online account,
    requires entering in a good deal of sensitive
                 personal information.
Security Encryption Systems

The Greek historian Plutarch wrote, for example, about
  Spartan generals who sent and received sensitive
messages using a scytale, a thin cylinder made out of
 wood. The general would wrap a piece of parchment
  around the scytale and write his message along its
 length. When someone removed the paper from the
    cylinder, the writing appeared to be a jumble of
    nonsense. But if the other general receiving the
parchment had a scytale of similar size, he could wrap
   the paper around it and easily read the intended
                        message.
Symmetric Key
 Just like two Spartan generals sending messages to each
 other, computers using symmetric-key encryption to send
 information between each other must have the same key.

 In symmetric-key encryption, each computer has a secret
key (code) that it can use to encrypt a packet of information
   before it is sent over the network to another computer.
Symmetric-key requires that you know which computers will
 be talking to each other so you can install the key on each
one. Symmetric-key encryption is essentially the same as a
 secret code that each of the two computers must know in
order to decode the information. The code provides the key
                  to decoding the message.
Public Key Encryption

  One of the weaknesses some point out about
   symmetric key encryption is that two users
attempting to communicate with each other need
  a secure way to do so; otherwise, an attacker
  can easily pluck the necessary data from the
     stream. Also known as asymmetric-key
   encryption, public-key encryption uses two
   different keys at once -- a combination of a
           private key and a public key.
SSL and TLS

  In your browser, you can tell when you are using a
secure protocol, such as TLS, in a couple of different
ways. You will notice that the "http" in the address line
 is replaced with "https," and you should see a small
padlock in the status bar at the bottom of the browser
window. When you're accessing sensitive information,
such as an online bank account or a payment transfer
service like PayPal or Google Checkout, chances are
 you'll see this type of format change and know your
    information will most likely pass along securely.
Hashing Algorithm

The key in public-key encryption is based on a
 hash value. This is a value that is computed
  from a base input number using a hashing
   algorithm. Essentially, the hash value is a
 summary of the original value. The important
  thing about a hash value is that it is nearly
impossible to derive the original input number
 without knowing the data used to create the
                  hash value.

More Related Content

Viewers also liked (6)

PPTX
Comparison of my products to existing media products
Amna Qaiser
DOCX
Trabajo internet historia
pupecilla
PPT
Question 1
410442
PPT
舒从仂仆 仄亠亟舒
亳从仂 丼仄仂于
PPTX
White fang
ddompierre
DOCX
Resultados 2 (Vulcanismo)
Sasuke Sakura
Comparison of my products to existing media products
Amna Qaiser
Trabajo internet historia
pupecilla
Question 1
410442
舒从仂仆 仄亠亟舒
亳从仂 丼仄仂于
White fang
ddompierre
Resultados 2 (Vulcanismo)
Sasuke Sakura

Similar to Eng 際際滷3 (20)

PDF
Week12
Ma310Shi
PDF
Ss
yuyatamaru
PDF
Week 12 slide
Haruki0428
PDF
Week 12 slide
Haruki0428
PDF
How encryption works
RaxTonProduction
ODP
Week12 b
Takuma Abe
PDF
Amazon
yuyatamaru
PDF
Amazon
yuyatamaru
PDF
Amazon
yuyatamaru
PDF
Amazon
yuyatamaru
PDF
Encryption
s1170037
PDF
Amazon
yuyatamaru
PDF
Amazon
yuyatamaru
PDF
Amazon
yuyatamaru
PDF
encryption
s1170037
PDF
Amazon
yuyatamaru
PDF
Amazon
yuyatamaru
PDF
s117
s1170034
PPT
Information Security
Presentaionslive.blogspot.com
DOCX
POST-QUANTUM CRYPTOGRAPHY
Pavithra Muthu
Week12
Ma310Shi
Week 12 slide
Haruki0428
Week 12 slide
Haruki0428
How encryption works
RaxTonProduction
Week12 b
Takuma Abe
Amazon
yuyatamaru
Amazon
yuyatamaru
Amazon
yuyatamaru
Amazon
yuyatamaru
Encryption
s1170037
Amazon
yuyatamaru
Amazon
yuyatamaru
Amazon
yuyatamaru
encryption
s1170037
Amazon
yuyatamaru
Amazon
yuyatamaru
s117
s1170034
Information Security
Presentaionslive.blogspot.com
POST-QUANTUM CRYPTOGRAPHY
Pavithra Muthu
Ad

More from S1715 (16)

PDF
Business all assignment
S1715
PDF
Business all assignment
S1715
PDF
Brine nslide999
S1715
PDF
Brine nslide999
S1715
PDF
Brine slide123
S1715
PDF
Brine slide123
S1715
PDF
Brine 11 instguide
S1715
PDF
Brine 11 instguide
S1715
PDF
Brine fesreport
S1715
PDF
Brine fesreport
S1715
PDF
Hat
S1715
PDF
際際滷4
S1715
PDF
際際滷4
S1715
PDF
Eng 際際滷3
S1715
PDF
Eng 際際滷3
S1715
PDF
際際滷2
S1715
Business all assignment
S1715
Business all assignment
S1715
Brine nslide999
S1715
Brine nslide999
S1715
Brine slide123
S1715
Brine slide123
S1715
Brine 11 instguide
S1715
Brine 11 instguide
S1715
Brine fesreport
S1715
Brine fesreport
S1715
Hat
S1715
際際滷4
S1715
際際滷4
S1715
Eng 際際滷3
S1715
Eng 際際滷3
S1715
際際滷2
S1715
Ad

Recently uploaded (20)

PPTX
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
DOCX
DLL english grade five goof for one week
FlordelynGonzales1
PDF
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
PPTX
Project 4 PART 1 AI Assistant Vocational Education
barmanjit380
PPTX
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
PDF
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
PDF
Rapid Mathematics Assessment Score sheet for all Grade levels
DessaCletSantos
PPT
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
PDF
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
DOCX
MUSIC AND ARTS 5 DLL MATATAG LESSON EXEMPLAR QUARTER 1_Q1_W1.docx
DianaValiente5
PDF
Learning Styles Inventory for Senior High School Students
Thelma Villaflores
PPTX
Martyrs of Ireland - who kept the faith of St. Patrick.pptx
Martin M Flynn
PPTX
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
PPTX
How to use _name_search() method in Odoo 18
Celine George
PPTX
Elo the HeroTHIS IS A STORY ABOUT A BOY WHO SAVED A LITTLE GOAT .pptx
JoyIPanos
PPTX
How to Create & Manage Stages in Odoo 18 Helpdesk
Celine George
PDF
COM and NET Component Services 1st Edition Juval L旦wy
kboqcyuw976
DOCX
ANNOTATION on objective 10 on pmes 2022-2025
joviejanesegundo1
PPTX
ENGLISH -PPT- Week1 Quarter1 -day-1.pptx
garcialhavz
PDF
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
KaryanaTantri21
Comparing Translational and Rotational Motion.pptx
AngeliqueTolentinoDe
DLL english grade five goof for one week
FlordelynGonzales1
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
Project 4 PART 1 AI Assistant Vocational Education
barmanjit380
How to Manage Wins & Losses in Odoo 18 CRM
Celine George
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
Rapid Mathematics Assessment Score sheet for all Grade levels
DessaCletSantos
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
Free eBook ~100 Common English Proverbs (ebook) pdf.pdf
OH TEIK BIN
MUSIC AND ARTS 5 DLL MATATAG LESSON EXEMPLAR QUARTER 1_Q1_W1.docx
DianaValiente5
Learning Styles Inventory for Senior High School Students
Thelma Villaflores
Martyrs of Ireland - who kept the faith of St. Patrick.pptx
Martin M Flynn
How Physics Enhances Our Quality of Life.pptx
AngeliqueTolentinoDe
How to use _name_search() method in Odoo 18
Celine George
Elo the HeroTHIS IS A STORY ABOUT A BOY WHO SAVED A LITTLE GOAT .pptx
JoyIPanos
How to Create & Manage Stages in Odoo 18 Helpdesk
Celine George
COM and NET Component Services 1st Edition Juval L旦wy
kboqcyuw976
ANNOTATION on objective 10 on pmes 2022-2025
joviejanesegundo1
ENGLISH -PPT- Week1 Quarter1 -day-1.pptx
garcialhavz
Romanticism in Love and Sacrifice An Analysis of Oscar Wildes The Nightingal...
KaryanaTantri21

Eng 際際滷3

  • 1. Introduction to How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information.
  • 2. Security Encryption Systems The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.
  • 3. Symmetric Key Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 4. Public Key Encryption One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key.
  • 5. SSL and TLS In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.
  • 6. Hashing Algorithm The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.