SlideShare a Scribd company logo
1 of 8
Download to read offline
How Encryption Works

  When we use the Internet, we're not always just
      clicking around and passively taking in
 information, such as reading news articles or blog
  posts -- a great deal of our time online involves
       sending others our own information.
  A typical transaction might include not only our
 names, e-mail addresses and physical address and
  phone number, but also passwords and personal
           identification numbers (PINs).
Information security is provided on computers and
     over the Internet by a variety of methods.
• Security Encryption Systems
• Computer encryption is based on the science of
  cryptography, which has been used as long as
  humans have wanted to keep information secret.
• As long as both generals had the correct cipher,
  they could decode any message the other sent.
• To make the message more difficult to decipher,
  they could arrange the letters inside the grid in any
  combination.
• Most forms of cryptography in use these days rely
  on computers, simply because a human-based
  code is too easy for a computer to crack.
• Computer encryption systems generally belong
  in one of two categories:
• Symmetric-key encryption
• Public-key encryption
• Symmetric Key
• Just like two Spartan generals sending messages to each
  other, computers using symmetric-key encryption to send
  information between each other must have the same key.

• In symmetric-key encryption, each computer has a secret
  key (code) that it can use to encrypt a packet of
  information before it is sent over the network to another
  computer. Symmetric-key requires that you know which
  computers will be talking to each other so you can install
  the key on each one. Symmetric-key encryption is
  essentially the same as a secret code that each of the two
  computers must know in order to decode the information.
  The code provides the key to decoding the message.
Caesar's Cipher
• Julius Caesar also used a similar substitution technique,
  shifting three letters up. If he wanted to say "CROSSING
  THE RUBICON," for instance, he'd write down "FURVV
  LQJWK HUXEL FRQ" instead. As you can see, the text is
  also broken up into even groups in order to make the size
  of each word less obvious.

• Think of it like this: You create a coded message to send to
  a friend in which each letter is substituted with the letter
  that is two down from it in the alphabet. So "A" becomes
  "C," and "B" becomes "D". You have already told a trusted
  friend that the code is "Shift by 2". Your friend gets the
  message and decodes it. Anyone else who sees the
  message will see only nonsense.
SSL and TLS
• A popular implementation of public-key
  encryption is the Secure Sockets Layer
  (SSL). Originally developed by Netscape,
  SSL is an Internet security protocol used by
  Internet browsers and Web servers to
  transmit sensitive information. SSL has
  become part of an overall security protocol
  known as Transport Layer Security (TLS).
Hashing Algorithm
• The key in public-key encryption is based
  on a hash value. This is a value that is
  computed from a base input number using a
  hashing algorithm. Essentially, the hash
  value is a summary of the original value.
  The important thing about a hash value is
  that it is nearly impossible to derive the
  original input number without knowing the
  data used to create the hash value.
Authentication
• As stated earlier, encryption is the process of
  taking all of the data that one computer is sending
  to another and encoding it into a form that only the
  other computer will be able to decode. Another
  process, authentication, is used to verify that the
  information comes from a trusted source.
  Basically, if information is "authentic," you know
  who created it and you know that it has not been
  altered in any way since that person created it.
  These two processes, encryption and
  authentication, work hand-in-hand to create a
  secure environment.

More Related Content

Viewers also liked

Intro To The Valuation Council 1.11.10
Intro To The Valuation Council 1.11.10Intro To The Valuation Council 1.11.10
Intro To The Valuation Council 1.11.10RICS Americas
 
lecture_5
lecture_5lecture_5
lecture_5farcrys
 
Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...
Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...
Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...Mamadigital
 
Maas Publications, LLC Portfolio 071510
Maas Publications, LLC Portfolio 071510Maas Publications, LLC Portfolio 071510
Maas Publications, LLC Portfolio 071510Maas Publications, LLC
 
Building a... Better? Summer Reading
Building a... Better? Summer ReadingBuilding a... Better? Summer Reading
Building a... Better? Summer ReadingS Bryce Kozla
 
lecture_9
lecture_9lecture_9
lecture_9farcrys
 
A brief on IT past present & what lies ahead
A brief on IT  past present & what lies aheadA brief on IT  past present & what lies ahead
A brief on IT past present & what lies aheadGhassan Kabbara
 
One week job india album 28 jobs 28 weeks 28 states - jubanashwa mishra
One week job india album   28 jobs 28 weeks 28 states - jubanashwa mishraOne week job india album   28 jobs 28 weeks 28 states - jubanashwa mishra
One week job india album 28 jobs 28 weeks 28 states - jubanashwa mishraJubanashwa Mishra
 
U poschrana1
U poschrana1U poschrana1
U poschrana1farcrys
 
Opleidingslandschap Geïntegreerde Politie
Opleidingslandschap Geïntegreerde PolitieOpleidingslandschap Geïntegreerde Politie
Opleidingslandschap Geïntegreerde PolitiePLOT - politieschool
 
SheSpeaks 2014 Predictions Study
SheSpeaks 2014 Predictions StudySheSpeaks 2014 Predictions Study
SheSpeaks 2014 Predictions StudySheSpeaks Inc.
 
Infinite Logistics Profile
Infinite Logistics ProfileInfinite Logistics Profile
Infinite Logistics ProfileBlogatize.net
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteDavid Keener
 
Vintalk Presentation I Pitomy 091510
Vintalk Presentation I Pitomy 091510Vintalk Presentation I Pitomy 091510
Vintalk Presentation I Pitomy 091510Vintalk
 

Viewers also liked (20)

Elvis 1984
Elvis 1984Elvis 1984
Elvis 1984
 
Intro To The Valuation Council 1.11.10
Intro To The Valuation Council 1.11.10Intro To The Valuation Council 1.11.10
Intro To The Valuation Council 1.11.10
 
lecture_5
lecture_5lecture_5
lecture_5
 
Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...
Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...
Comunicare con i Motori di Ricerca senza essere fraintesi: alla scoperta del ...
 
Maas Publications, LLC Portfolio 071510
Maas Publications, LLC Portfolio 071510Maas Publications, LLC Portfolio 071510
Maas Publications, LLC Portfolio 071510
 
Smart Service@KKU Library
Smart Service@KKU LibrarySmart Service@KKU Library
Smart Service@KKU Library
 
Building a... Better? Summer Reading
Building a... Better? Summer ReadingBuilding a... Better? Summer Reading
Building a... Better? Summer Reading
 
lecture_9
lecture_9lecture_9
lecture_9
 
A brief on IT past present & what lies ahead
A brief on IT  past present & what lies aheadA brief on IT  past present & what lies ahead
A brief on IT past present & what lies ahead
 
SEO On A Budget
SEO On A BudgetSEO On A Budget
SEO On A Budget
 
One week job india album 28 jobs 28 weeks 28 states - jubanashwa mishra
One week job india album   28 jobs 28 weeks 28 states - jubanashwa mishraOne week job india album   28 jobs 28 weeks 28 states - jubanashwa mishra
One week job india album 28 jobs 28 weeks 28 states - jubanashwa mishra
 
Yes for eban w.u
Yes for eban w.uYes for eban w.u
Yes for eban w.u
 
Best of The Talking Village Blog
Best of The Talking Village BlogBest of The Talking Village Blog
Best of The Talking Village Blog
 
One 2 One Rollover
One 2 One RolloverOne 2 One Rollover
One 2 One Rollover
 
U poschrana1
U poschrana1U poschrana1
U poschrana1
 
Opleidingslandschap Geïntegreerde Politie
Opleidingslandschap Geïntegreerde PolitieOpleidingslandschap Geïntegreerde Politie
Opleidingslandschap Geïntegreerde Politie
 
SheSpeaks 2014 Predictions Study
SheSpeaks 2014 Predictions StudySheSpeaks 2014 Predictions Study
SheSpeaks 2014 Predictions Study
 
Infinite Logistics Profile
Infinite Logistics ProfileInfinite Logistics Profile
Infinite Logistics Profile
 
Implementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking SiteImplementing OpenID for Your Social Networking Site
Implementing OpenID for Your Social Networking Site
 
Vintalk Presentation I Pitomy 091510
Vintalk Presentation I Pitomy 091510Vintalk Presentation I Pitomy 091510
Vintalk Presentation I Pitomy 091510
 

Similar to How Encryption Works Explained

Similar to How Encryption Works Explained (20)

Ss
SsSs
Ss
 
Week12
Week12Week12
Week12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Sw2
Sw2Sw2
Sw2
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Cryptography
CryptographyCryptography
Cryptography
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Kadai1
Kadai1Kadai1
Kadai1
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Cryptography
CryptographyCryptography
Cryptography
 
Week12 b
Week12 bWeek12 b
Week12 b
 
week 12
week 12week 12
week 12
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Week12
Week12Week12
Week12
 
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 
Eng Slide3
Eng Slide3Eng Slide3
Eng Slide3
 

More from yuyatamaru (16)

Amazon
AmazonAmazon
Amazon
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazonda
AmazondaAmazonda
Amazonda
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
How Firefox Works
How Firefox WorksHow Firefox Works
How Firefox Works
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

How Encryption Works Explained

  • 1. How Encryption Works When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs). Information security is provided on computers and over the Internet by a variety of methods.
  • 2. • Security Encryption Systems • Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. • As long as both generals had the correct cipher, they could decode any message the other sent. • To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination. • Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack.
  • 3. • Computer encryption systems generally belong in one of two categories: • Symmetric-key encryption • Public-key encryption
  • 4. • Symmetric Key • Just like two Spartan generals sending messages to each other, computers using symmetric-key encryption to send information between each other must have the same key. • In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to another computer. Symmetric-key requires that you know which computers will be talking to each other so you can install the key on each one. Symmetric-key encryption is essentially the same as a secret code that each of the two computers must know in order to decode the information. The code provides the key to decoding the message.
  • 5. Caesar's Cipher • Julius Caesar also used a similar substitution technique, shifting three letters up. If he wanted to say "CROSSING THE RUBICON," for instance, he'd write down "FURVV LQJWK HUXEL FRQ" instead. As you can see, the text is also broken up into even groups in order to make the size of each word less obvious. • Think of it like this: You create a coded message to send to a friend in which each letter is substituted with the letter that is two down from it in the alphabet. So "A" becomes "C," and "B" becomes "D". You have already told a trusted friend that the code is "Shift by 2". Your friend gets the message and decodes it. Anyone else who sees the message will see only nonsense.
  • 6. SSL and TLS • A popular implementation of public-key encryption is the Secure Sockets Layer (SSL). Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
  • 7. Hashing Algorithm • The key in public-key encryption is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. Essentially, the hash value is a summary of the original value. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.
  • 8. Authentication • As stated earlier, encryption is the process of taking all of the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Another process, authentication, is used to verify that the information comes from a trusted source. Basically, if information is "authentic," you know who created it and you know that it has not been altered in any way since that person created it. These two processes, encryption and authentication, work hand-in-hand to create a secure environment.