advertise your website Login Registration
 
 
 
Submission Guidelines Recent Approved Articles Featured Articles
Submit Free Article
Home About Us Advertising GuideLines Do's & Don't T & C FAQ Contact us
  Home Computers & Technology Articles Software Articles
 
HostJinni Promotions
Articles Category
Arts & Entertainment
Automotive
Business
Cancer
Careers
Communications
Computers & Technology
Finance
Food & Drink
Gaming
Health & Fitness
Home & Family
Home Based Business
Home Improvement
Insurance
Just for Women
Kids & Teens
Legal
News & Society
Online Business
Online Tickets
Pets
Real Estate
Reference and Education
Relationships
Self Improvement
Shopping
Sports & Recreation
Travel & Tourism
Writing
  Member Area
Author Login
Free Registration
Authors From Country
 
  Helpful Topics
How to Write Articles
Free Early Approval Tips
Why Article Submission
 
  Best of Webzine
Leader Board
Most Viewed Articles
Top Rated Articles
Archive
  WebZine Status
Total Articles -25441
Registered Authors - 4576
Featured Articles - 340
Articles added this
month - 0
 

Encryption Basics

    -    
Encryption is a privacy scheme to convert plain text into a non-readable form, called cypher-text, which cannot be understood by the unauthorized users. When the intended user converts the message to its original plain text form to make it understandable, that mechanism is called decryption. With the advent of Internet and widespread usage of online marketing, net banking, health care and other services, where business critical information are shared, everyone is much more aware of the application of encryption methodology.

In case of a connection to a secure server, the text gets encrypted automatically in the web browsers. However, many people prefer to use encryption in the email correspondence as well. The programs featuring plug-ins for email-clients help to accomplish this. PGP (Pretty Good Privacy) is the best among them. PGP helps not only in email message encryption, but the personal files and folders can also be encrypted using this methodology. Likewise, it is also possible to apply encryption to an entire drive or volume. A special decryption key is used to mount the drive for the access purpose. After the drive-read it can be dismounted and thus it returns to the encrypted state, so that Spywares, interlopers, snoops or Trojan horses cannot access it. Generally financial programs or other sensitive data of an organization are stored in encrypted drives.

As it is easier to tap wireless circuits, for wireless communications encryption or decryption is specially preferred. Nevertheless, for any kind of sensitive transaction encryption/decryption should be used, such as online purchase through credit card or sharing of organizational secrets between different departments.

There are basically two categories of the encryption methodology – symmetric and asymmetric. In a symmetric key algorithm a predetermined single key is shared between the client and server to both encrypt and decrypt texts. Blowfish, DES and AES are the examples of symmetric key algorithm. On the other hand, asymmetric key algorithm uses a key pair, a public and a private key. Public keys are used to encrypt the text, but the cypher-text can only be decrypted by the receiver, who own the private key of the key pair. Diffie-Hellman and RSA are the examples of asymmetric key algorithm. Asymmetric encryption is stronger than the symmetric encryption, because of the privacy of the decryption key. But it might not be very secure, until the recipient of the data or the server is correctly identified. In this regard, digital signatures are usually used online to authenticate the receiver.

As more people get exposed to the fact of the open nature of Internet, instant messaging and email, the need of encryption will undoubtedly be realized. Without encryption the Information, that is passed through Internet, is not only available to everyone, but is also open to be misused.
 
Like this article..? Rate it here:  Votes | Average: 1 out of 5  Votes | Average: 2 out of 5  Votes | Average: 3 out of 5  Votes | Average: 4 out of 5  Votes | Average: 5 out of 5     0 votes, average: out of 5    
About Author
   
Articles Stats
  Published Date - September 9 2013
  Total Views - 35
  Total Votes - 0
  Average Rating - 0
  Comments - 0
  Mr. Williams J Peterson
Since 1982, Software Diversified Services (SDS) is providing first-quality software and technical support for IBM mainframes and VM, VSE, and mainframe. SDS’s mainframe ftp secures ftp transactions on the mainframe network. At sdsusa.com you can find product trials and webcasts of other mainframe software tools from Software Diversified Services.
 
Particular Article
 
Author Article
  • How Open System Adapter Express (OSA-E) Secures Your Organization from Network Security Threats?
  • [2013-09-20 ]
    Secure data sharing over an enterprise network is a constant challenge for organizations as it involves dealing with many potential threats during data transfers. Read More...
  • Cryptography on Mainframe Systems
  • [2013-09-20 ]
    Mainframe system stores critical information of an organization; it communicates and coordinates with numerous devices that are connected to it in a network. Read More...
  • Encryption Basics
  • [2013-09-09 ]
    Encryption is a privacy scheme to convert plain text into a non-readable form, called cypher-text, which cannot be understood by the unauthorized users. Read More...
  • Computer Inventory on the Organization’s Network
  • [2013-09-09 ]
    Nowadays, the market is overfilled with programs of different price tiers and functionality. Often, the head managers get into difficulties trying to choose the best one among the dozens of tools. Read More...
  • Mainframe REXX
  • [2013-08-10 ]
    The Base Control Program (BCP) or MVS is the z/OS base element, which provides essential operating system services to the mainframe users. Read More...
  • Mainframe Software
  • [2013-08-10 ]
    The Enterprises working with mainframe systems should have a comprehensive list of the mainframe software available in the market to meet specific needs. Read More...
  • FTP to Mainframe
  • [2013-08-10 ]
    FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. Read More...
  • Z/OS SFTP
  • [2013-08-10 ]
    The core of z/OS, also referred as Multiple Virtual Storage (MVS) basically operates in two environments. Read More...
  • 10 Tips on Preparing to Replace a Policy Administration System
  • [2013-08-10 ]
    Many insurers launched new Policy Administration Systems (PAS) in the late 90’s, and the industry noise level is indicating that it may be time for many to upgrade. Read More...
  • How to Choose Best MSG2EML Converter Tool to Convert MSG to EML File?
  • [2013-07-14 ]
    There are many reasons when user prompts with the need to know how to choose best MSG2EML converter tool for export MSG to EML purpose. The search comes to an end at MSG to EML converter software. Read More...
  • MS Access Corrupt Database Recovery Tool – Ascertain Its Require Amongst Users
  • [2013-06-28 ]
    This segment gives readers a perfect view over various reasons behind the rising demand of MS Access corrupt database recovery tool amongst users and also suggest Access Recovery tool for the solution Read More...
  • Mainframe Security
  • [2013-06-28 ]
    For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Read More...
  • MSG To PST Download: Know What Is Beneficial About The Conversion
  • [2013-06-28 ]
    The segment will help you get familiar with creation of MSG files, major reasons that make PST files beneficial over MSG’s, etc for which MSG to PST Converter available with MSG to PST download. Read More...
  • Opt For Reliable MSG2EML Converter for Complete Email Migration
  • [2013-06-28 ]
    The article overviews the situations that compel users to call for MSG2EML converter applications. Also, this section highlights the right way of converting emails from MSG file format to EML. Read More...
  • Securing Mainframe FTP
  • [2013-06-14 ]
    File Transfer Protocol (FTP), built on client-server architecture, is a standard method for transferring files between hosts over a TCP-based network on different platforms as Unix, Z/OS, AS/400. Read More...
     
     
      Submit Articles - Free Articles - Online Articles Submission  
      WebZine Articles (webzinearticles.com) is a registered trademark. All Rights Reserved. 2012