Friday, March 22, 2019
Data Encryption Essay -- Computer Technology
encoding selective learning encryption refers to the transformation of selective information into a structure that makes it indecipherable by anyone without a secret decryption rudimentary. It ensures that messages can be read only if by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have genuinely made good use of it. Nowadays, encryption is one of the most consequential technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used. Encryption converts a message in such as modality that its contents are hidden from unauthorized readers. It is intended to keep messages and information as a secret. Plaintext, also known as clear text, is the gos aforementioned(prenominal)r or pilot burner message, which is has not yet been encrypted. Once the message is encrypted it is consequently called a cipher text. This process is obviously referred as encryption. The exact contrary process is called decryption. Encryption is the most successful way to attain data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Data encryption is a government agency of scrambling the data so that is can only be read by the person holding the key, a password of some sort. Without the key, the cipher cannot be broken and the data remains secure. Using the key, the cipher is decrypted and the data is returned to its original value or state. Each time one desires to encrypt data, a key from the 72,000,000,000,000,000 possible key variations, is randomly produced, and used to encrypt the data. The same key must be made known to the receiver if they ar... ...M and the US National Security Agency. It was previously the most dominant type of encryption, scarce it is now bei ng taken over by AES (Advanced Encryption Standard). Since data encryption standard, only took on a 56-bit symmetric key encryption, AES uses terce key sizes, 128, 192, and 256 bits. When personal computer users want to encrypt email or other documents, they go to Phillip Zimmerman?s Pretty Good Privacy software package. This software allows you to digitally sign a message, which verifies to the recipient that you are the sender and that no interfering is involved. Works Cited Data Encryption Standard (DES). http//www.itl.nist.gov/fipspubs/fip46-2.htmTechTalk Encryption.Computer Concepts. Parsons, June. Boston,Course Technology, 2006. Pg 328-331.Encryption. http//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212062,00.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.