Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Sw2 prezen3pdf
1. Introduction of the Encryption
● We have a lot of information that we don't want
other users to see. For example the following
things.
● Credit card information
● Private correspondence
● Personal details data
● Bank account information
● Etc.
2. Encryption Systems to security
Encryption has been a long time in various ways.
Encryption is used especially for military
purposes. Encryption has been created by
combining the number and text. Today, the
encryption more well known as algorithms.
3. Symmetric key encryption
Symmetric key encryption is thing
that encrypt and decrypt the same
to use the key cryptography. Each
computer has a secret key in
symmetric key encryption
4. Public key encryption
Public key encryption is a method to
expose the encryption key for
encrypted using separate keys for
encryption and decryption.
5. TLS(Transport Layer Security)
Transport Layer Security is a
protocol that required security for
communication. This protocol often
has called SSL(Secure Sockets
Layer frequently).The SSL
encryption provides the ability
authentication and tamper detection.
6. Hash function
The key of public key encryption is based on a
hash value. It is a value that is computed from a
base input number using a hashing function. Hash
functions are incorporated into the hash algorithm.
Hash function is used to detect tampering and
processing speed of the search speed and data
comparison.