into an unreadable form 复兴号9月21开跑 最霸气辞职信

Software Encryption is the process of scrambling data (or plain text) into an unreadable form (or cipher text). This scrambling process is based on algorithms that use various forms of substitution or transposition to encrypt the message. Algorithms are mathematical constructs that are applied through various applications to secure data transmissions or storage. Decryption is the process of using the same algorithm to restore the information to readable form. Encryption can be used at all levels of a security infrastructure. You can use encryption to protect network communications over the Internet or to help secure an intranet, e-mail, database entries, and files on a workstation or file server. Encryption can provide confidentiality, authentication, integrity, and non-repudiation for data traveling over a network or stored on a system. Protecting the confidentiality of data means ensuring that only the appropriate people have the ability to see the data. This is usually accomplished by encrypting the data so that it is readable only by the intended recipients. Authentication is the process of proving that you are who you say you are and establishing proof of identity. Authentication can be achieved through the use of passwords, smart cards, biometrics, or a combination thereof. Referring to data integrity means that the data has not been modified in any way, whether in transit or in storage. Message digests, or hashes, are often used to check data integrity. There are Two main cryptographic methods are used today: secret key and public key. Secret-Key (Symmetric) Method The secret key method (or symmetric method) is an encryption process in which one key is used for both encryption and decryption. Only the sender and receiver must know this key. Secret-key encryption is fast, efficient, and ideal for large data transmissions. This type of encryption is also effective when used in conjunction with public-key encryption, However, because the same secret key is used for both encryption and decryption, the sender and receiver must exchange keys before the data transmission, which raises a vital problem. The secret key must be transmitted over a secure channel to the receiver. But how is a channel secured? If a secure channel existed, encryption wouldnt be needed. So, the receiver and sender must devise a method for safely exchanging the key prior to transmission. One method is Secure Sockets Layer (SSL). The secret-key method also requires a large number of keys. Usually, people transmit data to and receive data from more than one party. Each pair of senders and receivers must have a special key requiring each party to maintain multiple keys. Additionally, many businesses interact with millions of one-time customers daily, making use of this technology highly infeasible. Thus, the secret-key method is best used in environments where the secret key can be easily exchanged and where frequent communication between parties exists. Digital Encryption Standard (DES) Today, Digital Encryption Standard (DES) is one of the most widely accepted, publicly available cryptographic systems. Developed by IBM in the 1970s, it was later adopted by the U.S. government as a national standard. About the Author: 相关的主题文章: