Encryption
Nov 01, 2014
Encryption
Encryption is the conversion of data into a form, called a ciphertext that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form also known as plaintext, so it can be understood. It is relied on by the computer security to make sure that no one unauthorized to see the data sees it.
What is it?
Symmetric encryptionThere are two types on encryption, one of
them is: Symmetric encryption, also known as secret key encryption. This is the oldest and best-known technique for encryption. A secret key (in which users share a common key), which can be a number, a word, or just a string of random letters, is applied to the text of a
message to change the content in a particular way. This might be by shifting each letter by a number of places in the alphabet. As long as both sender and
recipient know the secret key, they can encrypt and decrypt all messages that use
this key.
Asymmetric encryption The other type of encryption is:
Asymmetric encryption, this is also known as public key encryption. This is where there are two related keys (a key pair). A public key (where different keys are used for encryption and decryption) is made
freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by
using the matching public key.
When and whyWhen: Use encryption when you don’t trust both the network and CDP Server and the people that administrate them. However if you do trust them then you may see no benefit in using encryption. Also you probably don’t need encryption if you have backups of your documents.
Why: The reason why you should use encryption is because is prevents unauthorised access to documents and e-mail messages. along with this it protects data over the network and data stored in the CDP Server. This prevents hackers form getting into your computer and viewing and deleting your very important documents like essays for school work or important documents related to your job which you only have.
The difference
The difference between encryption and programming languages like python and
scratch is that in encryption you are writing a code so no one unauthorised can see what you have wrote. On the other hand, when you write codes in python or scratch you are writing it
so the computer can understand.
References
http://www.pcworld.com/article/15230/article.html
http://support.microsoft.com/kb/246071
http://www.howstuffworks.com/encryption.htm
http://www.google.co.uk/search?q=green+smoke&hl=en&tbm=isch&tbo=u&source=univ&sa=X&ei=l5AnUo-8BMSshQfgjoGIAw&sqi=2&ved=0CFgQsAQ&biw=1280&bih=923#facrc=_&imgdii=_&imgrc=ecquUfSLlV63TM%3A%3BaFDRmIzpufGN0M%3Bhttp%253A%252F%252Ffc02.deviantart.net%252Ffs30%252Ff%252F2008%252F165%252Fd%252F1%252FGreen_Smoke__Tribal_Fire_by_kerodhrone.jpg%3Bhttp%253A%252F%252Fkerodhrone.deviantart.com%252Fart%252FGreen-Smoke-Tribal-Fire-88552207%3B1264%3B918
http://www.google.co.uk/imgres?imgurl=&imgrefurl=http%3A%2F%2Fwww.w3resource.com%2Fpython%2Fpython-tutorial.php&h=0&w=0&sz=1&tbnid=OO5BXHlBkMORMM&tbnh=130&tbnw=387&zoom=1&docid=EYGxQngG_G8lqM&hl=en&ei=sJInUrrrJ6qV0AXp3oGAAg&ved=0CAEQsCU
https://www.google.co.uk/search?q=python&bav=on.2,or.r_qf.&bvm=bv.51495398,d.d2k,pv.xjs.s.en_US.M4-36_38X9A.O&biw=1280&bih=899&um=1&ie=UTF-8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=qpInUtbCB4b27AbwsIG4Cg#hl=en&q=scratch&spell=1&tbm=isch&um=1&facrc=_&imgdii=5BfJMOg2f9G7wM%3A%3BSgavwhkWQq6_fM%3B5BfJMOg2f9G7wM%3A&imgrc=5BfJMOg2f9G7wM%3A%3BZiT_yOnYxLW1gM%3Bhttp%253A%252F%252Fwww.mglworld.com%252Fwp-content%252Fuploads%252F2013%252F04%252FScratchCat-Large.png%3Bhttp%253A%252F%252Fwww.mglworld.com%252Fscratch-2-0-is-great-but-are-schools-ready-for-it%3B2000%3B2000
Please note that Nash Productions only uses sources for research, information and references that are reliable and
accurate. To insure this happens Nash Productions cross checks the data, and
checks if it is a secure source.If you have any problems with the
information or any of the references in this presentation or if you have any other inquiries, then please do not
hesitate in calling Nash Productions inquiry line on: 447404338651
or email us at: [email protected]
Thank You(Nakash Mahmood - founder and
director of Nash Productions)
Note