1. How Encryption Works
Online a lot of our time, you must send information and
our own people - if we use the Internet, we blog and
news articles such passively clicking around just always
read it, do not bear the information. It does this whether
some other online vendor or CD, order something on the
Internet, when you sign up for an account or online, you
must enter appropriate transactions for personal
information confidential. Our name as well as typical
transaction, as well as the physical address and phone
number and e-mail address, password or personal
identification number (PIN) may be included.
2. Security Encryption Systems
• Computer encryption is based on the science
of cryptography, which has been used as long
as humans have wanted to keep information
secret. Before the digital age, the biggest users
of cryptography were governments,
particularly for military purposes.
3. Symmetric Key
• In symmetric-key encryption, each computer has
a secret key (code) that it can use to encrypt a
packet of information before it is sent over the
network to another computer. Symmetric-key
requires that you know which computers will be
talking to each other so you can install the key on
each one. Symmetric-key encryption is essentially
the same as a secret code that each of the two
computers must know in order to decode the
information. The code provides the key to
decoding the message.
4. Public Key Encryption
• One of the weaknesses some point out about
symmetric key encryption is that two users
attempting to communicate with each other
need a secure way to do so; otherwise, an
attacker can easily pluck the necessary data
from the stream. In November 1976, a paper
published in the journal IEEE Transactions on
Information Theory, titled "New Directions in
Cryptography," addressed this problem and
offered up a solution: public-key encryption.
5. SSL and TLS
• A popular implementation of public-key
encryption is the Secure Sockets Layer (SSL).
Originally developed by Netscape, SSL is an
Internet security protocol used by Internet
browsers and Web servers to transmit
sensitive information. SSL has become part of
an overall security protocol known as
Transport Layer Security (TLS).
6. Hashing Algorithm
• The key in public-key encryption is based on a
hash value. This is a value that is computed
from a base input number using a hashing
algorithm. Essentially, the hash value is a
summary of the original value. The important
thing about a hash value is that it is nearly
impossible to derive the original input number
without knowing the data used to create the
hash value.