Encryption can be used for security purposes, but other techniques are still needed to make communications secure, particularly to ensure the integrity and authentication of a message. For example, Message Authentication Code (MAC) or digital signatures. The use of another is to protect the computer network analysis.
The real purpose of the techniques in terms of the above is to disguise the original data into new data in the form or other format, so that someone other than the owner of the rights of access to these data could not see or access them.
Typically used to secure data, in case the data fall into the hands of others who are not eligible. Whether it's to save themselves or for the purpose of sending data to another person.
Encryption is that for text and files. What is text encryption and file encryption? When you send a file via the Internet, you may not realize that in fact the file was actually floating virtual world before arriving at the destination address. The problem is what if the journey there that could peek inside? If the file is confidential then it means disaster for your secret. Therefore, there is some effort to protect critical files including, for example by installing a password. But this does not seem secure enough in sending the file.
Hence comes the name or file encryption text. Encryption refers to the algorithm schemes that encode plain text into non-readable form or cyphertext, so be very privacy. Recipients of encrypted text using the "key" to decrypt the message, and return it to its original text. The key is the trigger mechanism, the algorithm. Until the advent of the Internet, encryption is still rarely used by consumers, but most are used by the military. Currently, in online marketing, banking, health and other services, even the average household aware of the importance of encryption.
Web browser will encrypt the text automatically when connected to a secure server, this is evidenced by the address begins with https. Server to decrypt the text in the time of delivery, so even though the information travels between computers got hold of this file, is not helpful for those who stole it and will only see the codes that are not understood.
There are many types of encryption, but not all of them can be trusted. The ability to use computers can be used to break weak encryption schemes. Initially, 64-bit encryption is considered strong enough, but this time 128-bit encryption is standard, and this will certainly change again in the future.
Although the browser automatically encrypt the information when connected to a secure Web site, many people choose to use encryption in email correspondence as well. This can easily be achieved with encryption programs feature plug-ins or interface to the popular email clients. The longest is PGP (Pretty Good Privacy), a simple name for a powerful encryption program for first-rate military. PGP allows one to not only encrypt email messages, but personal files and folders as well.
Encryption can also be applied to the entire volume or drive. To use the drive, using a special decryption key. In this state the drive can be used and read as normal. Once completed, the drive down and return to the encrypted state. Some people choose to save the program of financial or other sensitive data on encrypted drives.
Encryption schemes are categorized as symmetric or asymmetric encryption. Symmetric key algorithms such as Blowfish, AES and DES, working with a single key that has been set previously shared between sender and receiver. Asymmetric encryption schemes, such as RSA and Diffie-Hellman, this scheme will make a "key partner" for the user: a public key and a private key. The public key can be published online for the sender that is used to encrypt the text to be sent to the owner's public key. Once encrypted, cyphertext can not be decrypted except by the person who holds the private key of the other. This algorithm is based around two key cooperate with each other. Asymmetric encryption is considered one step more secure than symmetric encryption because the decryption key can be kept private.
1 comments:
Great ! You have nicely explained the meaning and usage of encryption technique that is used to secure the data from unauthorized access. From this article I have learned a lot about this amazing tool that is widely used. Thanks.
eSignature
Post a Comment