Encryption Keeps Your Personal Data Private
When something is stored on your computer or sent by email
, it means others can get their hands on it. While few of us store secret blueprints for atom bombs on our PCs, we've still got information we'd rather keep away from prying eyes: the Excel spreadsheets we use to keep track of our finances, the Word documents that outline our plans for world domination, or the email evidence of our torrid love lives.
You don't need to be a spy or hopelessly paranoid to want to keep your data safe from prying eyes. If your computer was stolen or your emails intercepted, the damage could be serious especially if you use your PC for business. The last thing you want is for your competitors to get advance warning of new products, prices or contracts. If you use encryption software, they won't be able too.
Egyptian Encryption
Encryption is a way of scrambling text or data. If you know the right code, you can unscramble it to see the original message. If you don't know the code, all you see is gibberish. If you've ever bought something from an online shop, you've probably used encryption without realizing it; secure web servers encrypt your details to keep your credit card details safe from interception. Online banking uses encryption, and both individuals and companies are embracing encryption software in increasing numbers; the technology is also used for digital signatures that prove you are who you claim to be.
These days encryption is a high tech affair, but cryptography the science of encrypting and decrypting messages has been around for centuries. The Egyptians were using an early form of encryption as long ago as 1900 BC, and Julius Caesar (100BC 44BC) routinely encrypted his official messages. The technology used was very basic, but also very effective.
Breaking the Enigma
In 1939, Nazi U-boats were wreaking havoc on military and merchant ships. The submarines appeared from nowhere, torpedoing entire fleets before disappearing beneath the waves. Allied commanders knew that if they could break the Enigma code, they could listen in on the U-boats' orders and discover where they were. There was only one problem; the odds against breaking the Enigma code were 150 000 000 000 000 000 000 to 1.
The Allies recruited some of the country's brightest mathematicians and sent them to Bletchley Park, a mansion in Buckinghamshire that had been commandeered by the military. Their mission was simple; to crack the Enigma code.
Cracking the Enigma code was no simple matter. Enigma's complexity was bewildering and the codes changed daily. The code breakers built a Bombe.
Bombes Away
The Bombe was the work of mathematician Alan Turing, the father of modern computing. Based on the pioneering work of Polish code breakers, the Bombe was an early form of computer that could crunch numbers at a dizzying speed. In 1940 the Enigma code was defeated. Not only had Turing invented the forerunner of today's PC, he also proved that no matter how clever the code, any Private Key Cryptography can be broken if you chuck enough processing power at it.
Encryption Keeps Your Personal Data Private
By: Sandra Prior
Hitachi Data Systems oferece financiamento para aquisição de infra-estrutura de armazenamento Dynamics Gp Integration Manager Data Conversion And Migration Cases Fire Resistance Data Safe Can Omega Fish Oil Really Help With Substance Abuse Recovery? HR: Save Time and Money with Applicant Supplied Data The Data is in - Matt Leinart is a Bust Trouble Launching Applications In Mac And Data Recovery Solutions Fantasy Football Data Sheet - Current Best Practices are Damaged Data for Wall Street Investors - September 2010 Data for Running a Marathon Identity Corruption May Cause Data Loss In Microsoft Outlook Express Signs Of Recovery In The Machine Tools Industry From 2010 Say no to porn - recovery from pornography addiction - book review
www.yloan.com
guest:
register
|
login
|
search
IP(52.14.137.94) Washington / Seattle
Processed in 0.013351 second(s), 5 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 24 , 3259, 165,