Solved

Information About Data Encrypting and Data Encryption Systems

Posted on 1999-01-19
5
181 Views
Last Modified: 2010-04-27
 Help! I need to know about data encryption and and several
data encryption  systems. I  also need information as to the
the significance of matrices and how they are used to encode
data.
  Thank you very much in advance!

Sincerely yours,
Orifice
0
Comment
Question by:Orifice
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 12

Accepted Solution

by:
mark2150 earned 100 total points
ID: 1020713
Encryption is a large topic area. Volumes have been written about it, much too much to cover here. Simplest ciphers are substitution ciphers where one letter is substituted for another. Easy to break. More advanced ciphers include "one key pads", group substituions, double encryptions, etc. Modern electronics has made it possible for "brute force" systems to crack many older ciphers. DES (Data Encryption Standard) and public key systems are (somewhat) tougher to break. 56bit DES was broken last summer. 128 bit is much tougher to break, but not allowed for export as considered military technology. Other encription methods are based on elliptical filters and one-way mathematic operators.

A fully encrypted data stream is indistinguisable from noise.

PKZIP compression w/encryption does a pretty fair job of encrypting data as does PGP for most users.

Matrices are used in a variety of encryptions, what exactly were you after?

I could go into more detail, but I'd have to kill you.

M

PS I'm an old 32F20 - if you don't know what that means, don't ask.

0
 
LVL 2

Expert Comment

by:bushhead
ID: 1020714
i think asking once is enough.. get linda in the E-E lounge to remove the other 3? heheh.. or u can always give points away..

bush
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1020715
Nah! I wanted to give the *SAME* answer to all three and look 3x as smart! (grin)

M

0
 
LVL 84

Expert Comment

by:ozo
ID: 1020716
mark2150, have you heard anything about Cayley-Purser?
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1020717
Not specifically. I'm not active in the NSA community any more.

M

0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question