Click here to load reader
Upload
0008yuya
View
100
Download
0
Embed Size (px)
Citation preview
How Encryption Works
s1170008 Yuya Otsuka
1. Introduction to How Encryption Works
The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work.
It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop.
But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.
2. Security Encryption Systems
Computer encryption is based on the science of cryptography, which has been used as long as
humans have wanted to keep information secret.A Greek used a code first.
3. Symmetric Key
In symmetric-key encryption, each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the
network to another computer.
4. Public Key Encryption
Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a
combination of a private key and a public key.The private key is known only to your computer, while the public key is given by your computer to
any computer that wants to communicate securely with it.
5. SSL and TLS
● SSL(Secure Sockets Layer)● TLS(Transport Layer Security)
Originally developed by Netscape, SSL is an Internet security protocol used by Internet
browsers and Web servers to transmit sensitive information.
6. Authentication
Basically, if information is "authentic," you know who created it and you know that it has not been altered in any way since that person created it.