Friday, August 27, 2010

DATA ENCRYPTATION

by: english articles.info

In recent years, computer programmers have tried to make it easy for people to use computer systems. Unfortunately, in some situations the systems are too easy to use; they don’t have enough restrictions to safeguard secret information or to prevent an unauthorized person 5 from using that information. Therefore, several methods have been devised to prevent computer crime. One of them is data encryptation. When secret personal and financial data is transmitted to and from remote terminals, it must be encrypted (translated into a secret code) at one end and decrypted (translated back into plain text) at the other. 10 Since it is impractical to keep secret the algorithms that are used to encrypt and decrypt data, these algorithms are designed so that their operation depends on a certain data item called the key. It is the key that is kept secret. Even if you know all the details of the encrypting and decrypting algorithms, you cannot decrypt any messages unless 15 you know the key that was used when they were encrypted. For instance, the National Bureau of Standards has adopted an algorithm for encrypting and decrypting the data processed by federal agencies. The details of the algorithm have been published in the Federal Register. Plans are under way to incorporate the algorithm in special 20 purpose microprocessors, which anyone can purchase and install in his computer. So the algorithm is available to anyone who bothers to buy one of the special purpose microprocessors. But the operation of the algorithm is governed by a sixty-four-bit key. Since there are about 10,000,000,000,000,000,000,000 possible sixty-four-bit keys, no one 25 is likely to discover the correct one by chance. And, without the correct key, knowing the algorithm is useless.

JOB, JOBS, EMPLOYMENT

lowongan kerja Accounting, lowongan kerja Admin & HR, lowongan kerja Banking & Finance, lowongan kerja Beauty care & Health, lowongan kerja Building & Construction, lowongan kerja Design, lowongan kerja IT, lowongan kerja Engineering, lowongan kerja Insurance, lowongan kerja Telco

No comments:

Post a Comment