Seecrets On Security: A Gentle Introduction To Cryptography

Written by Stan Seecrets

Withrepparttar increasing incidence of identity thefts, credit card frauds, social engineering attacks,repparttar 139957 digital world is facing challenges inrepparttar 139958 years ahead. Obviously, cryptography, a young science, will play a prominent role inrepparttar 139959 security of protecting digital assets. This article tries to explainrepparttar 139960 basics of cryptography (encryption) using plain language.

Let us takerepparttar 139961 example of scrambling an egg. First, crackrepparttar 139962 shell, pourrepparttar 139963 contents into a bowl and beatrepparttar 139964 contents vigorously until you achievedrepparttar 139965 needed result - well, a scrambled egg. This action of mixingrepparttar 139966 molecules ofrepparttar 139967 egg is encryption. Sincerepparttar 139968 molecules are mixed-up, we sayrepparttar 139969 egg has achieved a higher state of entropy (state of randomness). To returnrepparttar 139970 scrambled egg to its original form (including uncrackingrepparttar 139971 shell) is decryption. Impossible?

However, if we substituterepparttar 139972 word “egg” and replace it with “number”, “molecules” with “digits”, it is POSSIBLE. This, my friend, isrepparttar 139973 exciting world of cryptography (crypto for short). It is a new field dominated by talented mathematicians who uses vocabulary like "non-linear polynomial relations", "overdefined systems of multivariate polynomial equations", "Galois fields", and so forth. These cryptographers uses language that mere mortals like us cannot pretend to understand.

Inrepparttar 139974 computer, everything stored are numbers. Your MP3 file is a number. Your text message is a number. Your address book is a longer number. The number 65 representsrepparttar 139975 character "A", 97 forrepparttar 139976 small "a", and so on.

For humans, we recognize numbers withrepparttar 139977 digits from 0 to 9, where else,repparttar 139978 computer can only recognize 0 or 1. This isrepparttar 139979 binary system which uses bits instead of digits. To convert bits to digits, just simply multiplyrepparttar 139980 number of bits by 0.3 to get a good estimation. For example, if you have 256-bits of Indonesian Rupiah (one ofrepparttar 139981 lowest currency denomination inrepparttar 139982 world), Bill Gates’ wealth in comparison would be microscopic.

The hexadecimal (base 16) system usesrepparttar 139983 ten digits from 0 to 9, plusrepparttar 139984 six extra symbols from A to F. This set has sixteen different “digits”, hencerepparttar 139985 hexadecimal name. This notation is useful for computer workers to peek intorepparttar 139986 "real contents" stored byrepparttar 139987 computer. Alternatively, treat these different number systems as currencies, be it Euro, Swiss Franc, British Pound andrepparttar 139988 like. Just like an object can be priced with different values using these currencies, a number can also be "priced" in these different number systems as well.

Top 5 Backup Tools You Can Pick Up For Pennies

Written by David D. Deprice

1. Acronis True Image 8.0 - 25% Off Special

Based onrepparttar exclusive Acronis Drive Snapshot disk imaging technology, Acronis True Image allows you to create an online system disk backup without reboot to keeprepparttar 139848 system productive. The product providesrepparttar 139849 fastest bare metal restore dramatically reducing a downtime and your IT costs.

2. Genie Backup Manager - 3 Day Sale

GBM is perfect for users of all computer comfort levels. Novice users will find it easy to create their first backup job in matter of minutes, thanks to an intuitive wizard-driven user interface, while advanced users will appreciate advanced features such as Email notification, Self executable backup sets, scripting, and 128-bit AES encryption.

3. AISBackup - Reseller Exclusive Offer

AISBackup only physically backs up new and changed files sincerepparttar 139850 last backup. It backs up virtually all open files and additionally opened exclusive files from local FAT drives. Restore options include: Complete Windows systems, individual files and folders, right click and 'open' from backup or 'Save as' from backup. Comprehensive restore destination and duplicate file options enable disaster recovery or cloning Windows to new drives and partitions.

Cont'd on page 2 ==> © 2005
Terms of Use