Solved

Information About Data Encrypting and Data Encryption Systems

Posted on 1999-01-19
5
182 Views
Last Modified: 2010-04-27
 Help! I need to know about data encryption and and several
data encryption  systems. I  also need information as to the
the significance of matrices and how they are used to encode
data.
  Thank you very much in advance!

Sincerely yours,
Orifice
0
Comment
Question by:Orifice
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 12

Accepted Solution

by:
mark2150 earned 100 total points
ID: 1020713
Encryption is a large topic area. Volumes have been written about it, much too much to cover here. Simplest ciphers are substitution ciphers where one letter is substituted for another. Easy to break. More advanced ciphers include "one key pads", group substituions, double encryptions, etc. Modern electronics has made it possible for "brute force" systems to crack many older ciphers. DES (Data Encryption Standard) and public key systems are (somewhat) tougher to break. 56bit DES was broken last summer. 128 bit is much tougher to break, but not allowed for export as considered military technology. Other encription methods are based on elliptical filters and one-way mathematic operators.

A fully encrypted data stream is indistinguisable from noise.

PKZIP compression w/encryption does a pretty fair job of encrypting data as does PGP for most users.

Matrices are used in a variety of encryptions, what exactly were you after?

I could go into more detail, but I'd have to kill you.

M

PS I'm an old 32F20 - if you don't know what that means, don't ask.

0
 
LVL 2

Expert Comment

by:bushhead
ID: 1020714
i think asking once is enough.. get linda in the E-E lounge to remove the other 3? heheh.. or u can always give points away..

bush
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1020715
Nah! I wanted to give the *SAME* answer to all three and look 3x as smart! (grin)

M

0
 
LVL 84

Expert Comment

by:ozo
ID: 1020716
mark2150, have you heard anything about Cayley-Purser?
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1020717
Not specifically. I'm not active in the NSA community any more.

M

0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question