Слайд 2Cryptography - data protection method
Derbyshev Lev
RI-270007
Слайд 4Enigma Encryption Machine
This is what the Enigma
machine looks like.
With its help, German
soldiers managed to pass
instructions during
World War II.
Слайд 5Information Problems
As the amount of data increases, the following problems appear:
Data leakage
Data
substitution
Distortion due to technical reasons
Слайд 6Personal data. Who is interested in this?
A lot of people search like
information. Its use may have a different character from the sale of a product to the actions of a criminal character.
Слайд 7One-way encryption
This is an example of how to calculate a unique hash
sum. Check the program for authenticity.
Слайд 8Two-way encryption
This type of encryption can be decrypted by knowing the master
key. It is designed to transmit data securely.