computer encryption is… based on the science of cryptography
TRANSCRIPT
![Page 1: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/1.jpg)
Computer encryption is…Computer encryption is…
Based on the Based on the science of science of
cryptographycryptography
![Page 2: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/2.jpg)
Encryption Padlock AnalogyEncryption Padlock Analogy
Anybody can lock a padlock…
but, it takes a key to unlock it!
![Page 3: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/3.jpg)
Symmetric key encryptionSymmetric key encryption
In In encryptionencryption, the word , the word symmetricsymmetric means means those cases where those cases where the same the same keykey both both
encrypts and encrypts and decrypts. decrypts.
![Page 4: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/4.jpg)
Asymmetric key encryptionAsymmetric key encryption
Type of encryption in Type of encryption in which an encryption which an encryption
key (the public key) is key (the public key) is used to encrypt a used to encrypt a
message, and message, and another encryption another encryption
key (the private key) key (the private key) is used to decrypt the is used to decrypt the
message. message.
![Page 5: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/5.jpg)
Public Key SecurityPublic Key Security
SSLSSL TLSTLS (Secure Sockets Layer) (Transport Layer Security)(Secure Sockets Layer) (Transport Layer Security)
![Page 6: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/6.jpg)
Other Security ToolsOther Security Tools Checksum Checksum CRC (Cyclic Redundancy Check)CRC (Cyclic Redundancy Check)
If a single character in the data is changed, If a single character in the data is changed, then the data has been corrupted.then the data has been corrupted.
Checksum or CRC e4d909c290d0fb1ca068ffaddf22cbd0
35d91262b3c3ec8841b54169588c97f7
Not identical
Checksum or CRC
![Page 7: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/7.jpg)
Ciphers or codes = algorithms.Ciphers or codes = algorithms.
Most cryptography used today Most cryptography used today relies on computers relies on computers
because of thebecause of the
speed and securityspeed and security
computers providecomputers provide
in cracking codes. in cracking codes.
![Page 8: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/8.jpg)
Hashing AlgorithmHashing Algorithm
Alice
Bob
Alice
Bob
Alice
Bob
Alice
Bob
Bob
Alice
+
+
= Different Color
= Different Color
+
+
+
+ = Same Color
= Same Color
One-way function*
*Example of two- way mathematical function = light switch.
![Page 9: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/9.jpg)
Encryption + AuthenticationEncryption + Authentication
PasswordsPasswordsPass cardsPass cardsDigital SignaturesDigital SignaturesFingerprint scan Fingerprint scan Retina scan Retina scan Face Scan Face Scan Voice identification Voice identification
![Page 10: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/10.jpg)
Why do we need encryption?Why do we need encryption?
•Credit-card information •Social Security numbers •Private correspondence •Personal details •Sensitive school information •Bank-account information
![Page 11: Computer encryption is… Based on the science of cryptography](https://reader035.vdocuments.site/reader035/viewer/2022081008/56649e955503460f94b9936e/html5/thumbnails/11.jpg)
But wait…there’s more!But wait…there’s more!
http://btwikilmc.pbworks.com/Encryption
http://www.aptv.org/aptplus/