Sunday, February 10, 2019
Data Encryption Essay -- Computer Technology
inscribeion Data autographion refers to the transformation of data into a structure that makes it un getable by anyone without a sneaking(a) decryption headstone. It ensures that kernels can be immortalise only by the planned recipient. encryption is the procedure of obscuring information to give it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy retain actually made good use of it. Nowadays, encryption is one of the well-nigh important technologies for maintaining your privacy and the security of important information. This helps out greatly peculiarly when E-Commerce is being used. Encryption converts a message in such as way that its contents are hidden from unauthorized readers. It is intended to withstand messages and information as a secret. Plaintext, also known as crystalize text, is the plain or original message, which is has not yet been encrypted. Once the message is encrypted it is then called a zipper text. This process is obviously referred as encryption. The hire opposite process is called decryption. Encryption is the most successful way to polish off data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Data encryption is a means of scrambling the data so that is can only be read by the person holding the key, a password of some sort. Without the key, the cipher cannot be broken and the data remains secure. Using the key, the cipher is decrypted and the data is returned to its original value or state. Each time one desires to encrypt data, a key from the 72,000,000,000,000,000 possible key variations, is randomly produced, and used to encrypt the data. The same key must be made known to the receiving system if they ar... ...M and the US National Security Agency. It was previously the most dominant flake of encryption, but it is now being taken over by AES (Advanced Encryption Standard). Since data encryption standard, only took on a 56-bit symmetric key encryption, AES uses three key sizes, 128, 192, and 256 bits. When personal computer users want to encrypt e-mail or other documents, they go to Phillip Zimmerman?s Pretty Good secretiveness software. This software allows you to digitally sign a message, which verifies to the recipient that you are the vector and that no interfering is involved. Works Cited Data Encryption Standard (DES). http//www.itl.nist.gov/fipspubs/fip46-2.htmTechTalk Encryption. computer Concepts. Parsons, June. Boston,Course Technology, 2006. Pg 328-331.Encryption. http//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212062,00.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment