Cryptography - data protection method

Слайд 2

Cryptography - data protection method

Derbyshev Lev
RI-270007

Cryptography - data protection method Derbyshev Lev RI-270007

Слайд 3

Caesar cipher

Caesar cipher

Слайд 4

Enigma Encryption Machine

This is what the Enigma
machine looks like.
With its help, German

Enigma Encryption Machine This is what the Enigma machine looks like. With

soldiers managed to pass
instructions during
World War II.

Слайд 5

Information Problems

As the amount of data increases, the following problems appear:
Data leakage
Data

Information Problems As the amount of data increases, the following problems appear:
substitution
Distortion due to technical reasons

Слайд 6

Personal data. Who is interested in this?

A lot of people search like

Personal data. Who is interested in this? A lot of people search
information. Its use may have a different character from the sale of a product to the actions of a criminal character.

Слайд 7

One-way encryption

This is an example of how to calculate a unique hash

One-way encryption This is an example of how to calculate a unique
sum. Check the program for authenticity.

Слайд 8

Two-way encryption

This type of encryption can be decrypted by knowing the master

Two-way encryption This type of encryption can be decrypted by knowing the
key. It is designed to transmit data securely.