Project......'Yellow Wellies'
   
The man has yellow wellies
 
This property was reserved by

nationofdomination
on
18th Mar 1999

I'm 67 years old, from Ireland.


ENCRYPTION AND DECRYPTION:


Encryption is the conversion of data into a form,
called a cipher, that cannot be easily
intercepted by unauthorized people. Decryption
is the process of converting encrypted data back
into its original form, so it can be understood.
The use of encryption/decryption is as old as the
art of communication. In wartime, a cipher, often
incorrectly called a "code," can be employed to
keep the enemy from obtaining the contents of
transmissions. (Technically, a code is a means
of representing a signal without the intent of
keeping it secret; examples are Morse code and
ASCII.) Simple ciphers include the substitution
of letters for numbers, the rotation of letters
in the alphabet, and the "scrambling" of voice
signals by inverting the sideband frequencies.
More complex ciphers work according to
sophisticated computer algorithms that rearrange
the data bits in digital signals.
In order to easily recover the contents of an
encrypted signal, the correct decryption key
is required. The key is an algorithm that
"undoes" the work of the encryption algorithm.
Alternatively, a computer can be used in an
attempt to "break" the cipher. The more complex
the encryption algorithm, the more difficult it
becomes to eavesdrop on the communications
without access to the key.

Encryption/decryption is especially important
in wireless communications. This is because
wireless circuits are easier to "tap" than
their hard-wired counterparts. Nevertheless,
encryption/decryption is a good idea when
carrying out any kind of sensitive transaction,
such as a credit-card purchase online, or the
discussion of a company secret between different
departments in the organization. The stronger
the cipher -- that is, the harder it is for
unauthorized people to break it -- the better,
in general. However, as the strength of
encryption/decryption increases, so does the
cost.

In recent years, a controversy has arisen over
so-called strong encryption. This refers to
ciphers that are essentially unbreakable without
the decryption keys. While most companies and
their customers view it as a means of keeping
secrets and minimizing fraud, some governments
view strong encryption as a potential vehicle by
which terrorists might evade authorities. These
governments, including that of the United States,
want to set up a key-escrow arrangement. This
means everyone who uses a cipher would be
required to provide the government with a copy
of the key. Decryption keys would be stored in
a supposedly secure place, used only by
authorities, and used only if backed up by a
court order. Opponents of this scheme argue
that criminals could hack into the key-escrow
database and illegally obtain, steal, or alter
the keys. Supporters claim that while this is
a possibility, implementing the key escrow
scheme would be better than doing nothing to
prevent criminals from freely using
encryption/decryption.




HOW ENCRYPTION WORKS :



Most encrypted transactions today use a
combination of private keys, public keys,
secret keys, hash functions, and digital
certificates to achieve authentication (of
sender and recipient), confidentiality,
message integrity, and nonrepudiation by
either party. Hash functions are fixed values derived mathematically from a text message. Each sender and recipient has a private key, known only to him/her and a public key, which can be known by anyone. Each encryption/decryption process requires at least one public key and one private key, and both must be from the same party. A single secret key is used to encrypt the message, because secret key encryption requires less processing power than using public and private keys.
A digital certificate, signed by a certificate
authority, validates senders' and recipients'
public keys.
 
 

 
Favourite links
 


Email me at:
[email protected]

This page has been visited times.