How Encryption for Strong Security
                 Works
●   Data encryption
●   File encryption
●   Link encryption
●   VPN           ●   S1170075 Kanto Nakayama
                  ●   S1170077 Haruka Hashimoto
                  ●   S1170081 Youta Matsuzaki
                  ●   S1170086 Makoto Yoshizawa
Data encryption
●   Data encryption
    standard is block
    cipher that based on a
    symmetric-key
    algorithm.
●   It is used mainly in
    USA.
●   And also used by
    UNIX system.
File encryption
        ●   The File Encryption is
            simple file coding soft.
        ●   The coded file is
            decoding by password
             input.
Link encryption
●   Link encryption is an
    approach to communications
    security that encrypts and
    decrypts all traffic at each end
    of a communications line (e.g.
    a teletype circuit or the line
    between two network
    switches).
●   It contrasts with end-to-end
    encryption where messages
    are encrypted by the sender
    at the point of origin and only
    decrypted by the intended
    receiver.
VPN
  ●   VPN is a Virtual
      Private Network.
  ●   VPN is the service
      that can use a public
      line as if it is a
      dedicated line.
Reference
●   E-Words
    http://e-words.jp/
●   Wikipedia
    http://en.wikipedia.org/wiki/Main_Page
●   @ IT
    http://www.atmarkit.co.jp/
●   Hitachisoft
    http://hitachisoft.jp/index.html

How Encryption For Strong Security Works

  • 1.
    How Encryption forStrong Security Works ● Data encryption ● File encryption ● Link encryption ● VPN ● S1170075 Kanto Nakayama ● S1170077 Haruka Hashimoto ● S1170081 Youta Matsuzaki ● S1170086 Makoto Yoshizawa
  • 2.
    Data encryption ● Data encryption standard is block cipher that based on a symmetric-key algorithm. ● It is used mainly in USA. ● And also used by UNIX system.
  • 3.
    File encryption ● The File Encryption is simple file coding soft. ● The coded file is decoding by password input.
  • 4.
    Link encryption ● Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teletype circuit or the line between two network switches). ● It contrasts with end-to-end encryption where messages are encrypted by the sender at the point of origin and only decrypted by the intended receiver.
  • 5.
    VPN ● VPN is a Virtual Private Network. ● VPN is the service that can use a public line as if it is a dedicated line.
  • 6.
    Reference ● E-Words http://e-words.jp/ ● Wikipedia http://en.wikipedia.org/wiki/Main_Page ● @ IT http://www.atmarkit.co.jp/ ● Hitachisoft http://hitachisoft.jp/index.html