SlideShare a Scribd company logo
1 of 5
Download to read offline
ENCRYPTION 
A GUIDE FOR EVERYONE 
WWW.CYBERGHOSTVPN.COM
WHAT IS IT? 
Encryption is the process through which informati-on 
or data is transformed (encoded) in such a way that is unreadable to anyone who does not have the knowledge of the way it was transformed. 
The information thus becomes available only to the 
authorized parties. This authorization works based 
on keys. Encoding the information is made by using an encryption key while decoding the information 
is made by using a decryption key. 
WHEN WAS 
IT INVENTED? 
100-44 B.C. Caesar used a cipher to hide his milita-ry 
correspondence. The key in this case was simply 
to shift to the right by three. 
The Greek historian Plutarch wrote, for example, 
about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder 
made out of wood. The general would wrap a pie- 
ce of parchment around the scytale and write his 
message along its length. When someone removed the paper from the cylinder, the writing appeared 
to be a jumble of nonsense. 
The Greeks were also the first to use ciphers, spe-cific 
codes that involve substitutions or transposi- 
tions of letters and numbers. 
HOW DOES IT WORK? 
Encryption prevents the interceptors of messages from having access to this information. Encryption 
does not prevent information from being intercep- 
ted by unwanted parties than the ones intended. 
The easiest comparison that will help you under-stand 
this is: postcard versus letter in a sealed en-velope. 
Unencrypted information transmitted via 
the Internet is like a message written on a post- 
card, anyone who can intercept it can read it. The 
encrypted information is like a letter, it is not vi-sible 
even for those who are in contact with it. Of course these persons can open it, it’s not the same 
thing for the encrypted message, and this is where the metaphor ends. 
The text before encryption is called PLAINTEXT. 
The encrypted text is called CIPHER TEXT. 
Encryption example 
> Plain text: A B C 
Encryption algorithm = move each letter one 
place to the left in the alphabet 
> Cipher text: B C D 
EXAMPLE:
SYMMETRICAL ENCRYPTION 
There are two types of encryptions: symmetrical and public-key encryption. 
In symmetrical encryption the encryption and decryption key are the same. 
So the communicating parts exchanging information 
among them have the same key. 
PUBLIC VS. SYMMETRICAL ENCRYPTION 
= 
ENCRYPTION 
DECRYPTION 
PLAINTEXT 
CIPHERTEXT 
PLAINTEXT
PUBLIC KEY ENCRYPTION 
In public-key encryption the encryption key is made public (public key) so anyone can use it to encrypt messages, but the decryption key is limitedly available to the intended receiving party (private key). 
The public key is available to any computer that wants to have it and encrypt messages, while he private key is available only for your computer. 
For decoding a message both public and private keys are necessary. If somebody intercepts a message they will not be able to read it without the private key. 
The pair of keys is constructed using prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is an infinite number of prime numbers which means infinite combinations and possibilities for keys. 
PGP, a very popular software that uses this type of encryption, works with the following process: the sender encrypts information using a symmetric key, the symmetric keys is then encrypted using the public key of the receiver. The receiver uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document. 
PUBLIC VS. SYMMETRICAL ENCRYPTION 
= 
ENCRYPTION 
PLAINTEXT 
CIPHERTEXT 
PLAINTEXT 
PUBLIC KEY 
PRIVATE KEY 
DECRYPTION
A HISTORY 
OF ENCRYPTION 
100-44 B.C. – Caeser used a cipher to hide his mili-tary 
correspondence. The key in this case was sim-ply 
to shift to the right by three. 
1973 – GCHQ describes for the first time this pro- 
cess of asymmetric encryption. 
1977 – The first major asymmetric algorithm deve-loped 
for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key. 
Although a 56-bit key offers more than 70 quadrillion 
possible combinations (70,000,000,000,000,000), 
an attack of brute force (simply trying every possib-le 
combination in order to find the right key) could 
decipher encrypted data in a short while. DES has 
since been replaced by the Advanced Encryption 
Standard (AES), which uses 128-, 192- or 256-bit 
keys. 
1976 - paper published in the journal IEEE Transac-tions 
on Information Theory, titled „New Directions 
in Cryptography,“ addressed this problem and offe-red 
up a solution: public-key encryption. 
1991 – Phil Zimmermann writes and application 
with public key available called Pretty Good Privacy 
(PGP) 
2010 – Symantec acquires PGP for $300M 
WHERE IS 
ENCRYPTION USED? 
It started out as being used by militaries and governments to allow secret communications. 
Today it is used on a large scale by companies and 
civilians both to protect company and personal 
data. 
Encryption protects security and privacy of the files on computer and it is also used to protect data 
transferred in different networks: on the internet, 
on mobile telephones, wireless microphones, wi-reless 
intercom systems, Bluetooth devices and bank automatic teller machines. 
When it comes to security of information it is not 
only important to keep the confidentiality of the in- 
formation but also the integrity and make sure the message is authenticating by employing methods 
like digital signatures. 
DATA INTEGRITY 
HASHING 
Hashing is another method through of transforma- 
tion of a data in which you can ensure integrity of 
it. It ensures that the data has not been tampered 
with. 
The same output can be produced by different in-puts. 
This is an irreversible procedure, you cannot get from output to input. 
Sources: 
http://en.wikipedia.org/wiki/Encryption 
https://ssd.eff.org/tech/encryption 
http://www.webopedia.com/TERM/H/hashing.html

More Related Content

What's hot

Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganographyNikhil l
 
Cryptography
CryptographyCryptography
CryptographyHira Khan
 

What's hot (9)

Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography
CryptographyCryptography
Cryptography
 
Ss
SsSs
Ss
 
Data encryption
Data encryptionData encryption
Data encryption
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Sw week12
Sw week12Sw week12
Sw week12
 

Viewers also liked

Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The InternetJennifer Chilek
 
Computer awareness i logo
Computer awareness i logoComputer awareness i logo
Computer awareness i logoMadhan Kumar
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineTodd Stanfield
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacyRam Parthasarathy
 
The Future of Data in a Connected World
The Future of Data in a Connected WorldThe Future of Data in a Connected World
The Future of Data in a Connected WorldSAP Technology
 
The Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyThe Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyBytemobile
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsBeyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsAmazon Web Services
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionOfsted
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Brain Computer Interface.ppt
Brain Computer Interface.pptBrain Computer Interface.ppt
Brain Computer Interface.pptAmal Sanjay
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interfaceKomal Maloo
 

Viewers also liked (20)

Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
 
Cnwl e safety-tutorial_2013
Cnwl e safety-tutorial_2013Cnwl e safety-tutorial_2013
Cnwl e safety-tutorial_2013
 
Computer awareness i logo
Computer awareness i logoComputer awareness i logo
Computer awareness i logo
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Protecting your online privacy
Protecting your online privacyProtecting your online privacy
Protecting your online privacy
 
The Future of Data in a Connected World
The Future of Data in a Connected WorldThe Future of Data in a Connected World
The Future of Data in a Connected World
 
Computer awareness
Computer awarenessComputer awareness
Computer awareness
 
The Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing ProfitablyThe Mobile Internet: Meeting Demand and Growing Profitably
The Mobile Internet: Meeting Demand and Growing Profitably
 
Online Safety 3.0
Online Safety 3.0Online Safety 3.0
Online Safety 3.0
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsBeyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Brain Computer Interface.ppt
Brain Computer Interface.pptBrain Computer Interface.ppt
Brain Computer Interface.ppt
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 

Similar to CyberGhost VPN Encryption Guide

DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionClint Walker
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - PaperBernhard Hofer
 
How encryption works
How encryption worksHow encryption works
How encryption worksMariko Saitoh
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 

Similar to CyberGhost VPN Encryption Guide (20)

DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
cryptography
cryptographycryptography
cryptography
 
Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
Week12
Week12Week12
Week12
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Cryptography
CryptographyCryptography
Cryptography
 
Security Systems for Digital Data - Paper
Security Systems for Digital Data - PaperSecurity Systems for Digital Data - Paper
Security Systems for Digital Data - Paper
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
 
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYMETHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEY
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 

Recently uploaded

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 

Recently uploaded (20)

Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 

CyberGhost VPN Encryption Guide

  • 1. ENCRYPTION A GUIDE FOR EVERYONE WWW.CYBERGHOSTVPN.COM
  • 2. WHAT IS IT? Encryption is the process through which informati-on or data is transformed (encoded) in such a way that is unreadable to anyone who does not have the knowledge of the way it was transformed. The information thus becomes available only to the authorized parties. This authorization works based on keys. Encoding the information is made by using an encryption key while decoding the information is made by using a decryption key. WHEN WAS IT INVENTED? 100-44 B.C. Caesar used a cipher to hide his milita-ry correspondence. The key in this case was simply to shift to the right by three. The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a pie- ce of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. The Greeks were also the first to use ciphers, spe-cific codes that involve substitutions or transposi- tions of letters and numbers. HOW DOES IT WORK? Encryption prevents the interceptors of messages from having access to this information. Encryption does not prevent information from being intercep- ted by unwanted parties than the ones intended. The easiest comparison that will help you under-stand this is: postcard versus letter in a sealed en-velope. Unencrypted information transmitted via the Internet is like a message written on a post- card, anyone who can intercept it can read it. The encrypted information is like a letter, it is not vi-sible even for those who are in contact with it. Of course these persons can open it, it’s not the same thing for the encrypted message, and this is where the metaphor ends. The text before encryption is called PLAINTEXT. The encrypted text is called CIPHER TEXT. Encryption example > Plain text: A B C Encryption algorithm = move each letter one place to the left in the alphabet > Cipher text: B C D EXAMPLE:
  • 3. SYMMETRICAL ENCRYPTION There are two types of encryptions: symmetrical and public-key encryption. In symmetrical encryption the encryption and decryption key are the same. So the communicating parts exchanging information among them have the same key. PUBLIC VS. SYMMETRICAL ENCRYPTION = ENCRYPTION DECRYPTION PLAINTEXT CIPHERTEXT PLAINTEXT
  • 4. PUBLIC KEY ENCRYPTION In public-key encryption the encryption key is made public (public key) so anyone can use it to encrypt messages, but the decryption key is limitedly available to the intended receiving party (private key). The public key is available to any computer that wants to have it and encrypt messages, while he private key is available only for your computer. For decoding a message both public and private keys are necessary. If somebody intercepts a message they will not be able to read it without the private key. The pair of keys is constructed using prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is an infinite number of prime numbers which means infinite combinations and possibilities for keys. PGP, a very popular software that uses this type of encryption, works with the following process: the sender encrypts information using a symmetric key, the symmetric keys is then encrypted using the public key of the receiver. The receiver uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document. PUBLIC VS. SYMMETRICAL ENCRYPTION = ENCRYPTION PLAINTEXT CIPHERTEXT PLAINTEXT PUBLIC KEY PRIVATE KEY DECRYPTION
  • 5. A HISTORY OF ENCRYPTION 100-44 B.C. – Caeser used a cipher to hide his mili-tary correspondence. The key in this case was sim-ply to shift to the right by three. 1973 – GCHQ describes for the first time this pro- cess of asymmetric encryption. 1977 – The first major asymmetric algorithm deve-loped for computers in the United States was the Data Encryption Standard (DES), approved for use in the 1970s. The DES uses a 56-bit key. Although a 56-bit key offers more than 70 quadrillion possible combinations (70,000,000,000,000,000), an attack of brute force (simply trying every possib-le combination in order to find the right key) could decipher encrypted data in a short while. DES has since been replaced by the Advanced Encryption Standard (AES), which uses 128-, 192- or 256-bit keys. 1976 - paper published in the journal IEEE Transac-tions on Information Theory, titled „New Directions in Cryptography,“ addressed this problem and offe-red up a solution: public-key encryption. 1991 – Phil Zimmermann writes and application with public key available called Pretty Good Privacy (PGP) 2010 – Symantec acquires PGP for $300M WHERE IS ENCRYPTION USED? It started out as being used by militaries and governments to allow secret communications. Today it is used on a large scale by companies and civilians both to protect company and personal data. Encryption protects security and privacy of the files on computer and it is also used to protect data transferred in different networks: on the internet, on mobile telephones, wireless microphones, wi-reless intercom systems, Bluetooth devices and bank automatic teller machines. When it comes to security of information it is not only important to keep the confidentiality of the in- formation but also the integrity and make sure the message is authenticating by employing methods like digital signatures. DATA INTEGRITY HASHING Hashing is another method through of transforma- tion of a data in which you can ensure integrity of it. It ensures that the data has not been tampered with. The same output can be produced by different in-puts. This is an irreversible procedure, you cannot get from output to input. Sources: http://en.wikipedia.org/wiki/Encryption https://ssd.eff.org/tech/encryption http://www.webopedia.com/TERM/H/hashing.html