Solved

Information About Data Encrypting and Data Encryption Systems

Posted on 1999-01-19
5
177 Views
Last Modified: 2010-04-27
 Help! I need to know about data encryption and and several
data encryption  systems. I  also need information as to the
the significance of matrices and how they are used to encode
data.
  Thank you very much in advance!

Sincerely yours,
Orifice
0
Comment
Question by:Orifice
  • 3
5 Comments
 
LVL 12

Accepted Solution

by:
mark2150 earned 100 total points
ID: 1020713
Encryption is a large topic area. Volumes have been written about it, much too much to cover here. Simplest ciphers are substitution ciphers where one letter is substituted for another. Easy to break. More advanced ciphers include "one key pads", group substituions, double encryptions, etc. Modern electronics has made it possible for "brute force" systems to crack many older ciphers. DES (Data Encryption Standard) and public key systems are (somewhat) tougher to break. 56bit DES was broken last summer. 128 bit is much tougher to break, but not allowed for export as considered military technology. Other encription methods are based on elliptical filters and one-way mathematic operators.

A fully encrypted data stream is indistinguisable from noise.

PKZIP compression w/encryption does a pretty fair job of encrypting data as does PGP for most users.

Matrices are used in a variety of encryptions, what exactly were you after?

I could go into more detail, but I'd have to kill you.

M

PS I'm an old 32F20 - if you don't know what that means, don't ask.

0
 
LVL 2

Expert Comment

by:bushhead
ID: 1020714
i think asking once is enough.. get linda in the E-E lounge to remove the other 3? heheh.. or u can always give points away..

bush
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1020715
Nah! I wanted to give the *SAME* answer to all three and look 3x as smart! (grin)

M

0
 
LVL 84

Expert Comment

by:ozo
ID: 1020716
mark2150, have you heard anything about Cayley-Purser?
0
 
LVL 12

Expert Comment

by:mark2150
ID: 1020717
Not specifically. I'm not active in the NSA community any more.

M

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now