Wednesday, March 27, 2019
Data Encryption Essay -- Data Security
Missing Chart encodingEncryption is a manner of programming data for security so that it appears to be random data. Only the mass sending and receiving the in produceation watch the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key atomic number 18 the people who are intended to read the message. Not many people know what encodeion is. I took a survey of twenty students and asked two interrogations. The first research I asked was do you know what cipherion means and the second question I asked was have you ever heard of anybody using write in codeion. This is a chart of the information I received Many people wonder scarce how encryption works. People think that encryption is the same thing as coding when in fact it is very different. Computer code is utilize to seduce software while encryption is used to disguise a message from the public. Coding such as ASCII and EBCDIC are used to create data th at is publicly shared. With encryption, when you first put in a message, its goes in as plaintext. Plaintext is the text in its original form when it has not been encrypted. A message that has been encrypted is know as ciphertext. The sue of converting plaintext to ciphertext is known as encryption. The process of changing ciphertext into plaintext is known as decryption (Parsons 328).In order to encrypt a message you need to use a cryptographic algorithmic rule key. A cryptographic key can be a word, accent or number that has to be known in order to encrypt or decrypt a message. Caesar created his own encryption method known as simple substitution. His encryption was to change the alphabet to start with D and continue with the alphabet from there. When he reached... ...n use your private key to encrypt them. It is basically the safest way to send e-mail.As I mentioned before, most people believe that encryption is a very complex process when in often it is very simple. Weak enc ryptions such as Caesars simple substation method prove how simple encryption can really be. Strong encryption can be nearly impossible to crack. You need a special(prenominal) computer and it can take a long time to get wind out the message. Encryption such as the PGP method, are used to clench privacy through e-mails. Overall, encryption is mainly used for privacy and protective cover in all types of situations. Works cited Parsons, June Jamrich, Dan Oja. New Perspectives on Computer Concepts eighth Edition. Boston, MA Course Technology. http//en.wikipedia.org/wiki/Encryption http//www.cesa8.k12.wi.us/media/digital_dictionary.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment