Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Information About Data Encrypting and Data Encryption Systems

Posted on 1999-01-19
6
Medium Priority
?
254 Views
Last Modified: 2010-04-27
 Help! I need to know about data encryption and and several
data encryption  systems. I  also need information as to the
the significance of matrices and how they are used to encode
data.
  Thank you very much in advance!

Sincerely yours,
Orifice
0
Comment
Question by:Orifice
6 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1020725
I can't help you, but I suggest you delete the duplicate questions to have your points refunded, before someone "answers" them.
Ralph
0
 
LVL 1

Expert Comment

by:ZenMaster
ID: 1020726
As far as data encryption systems, I can't say I know much about them, but data encryption is another matter.

Matrices are used in encryption as coders and de-coders.  First, data in its raw form is translated into a matrix (there are numerous ways to do this; by character, by word, by 10-space block, etc.).  Then a coding matrix is formed, and the two are multiplied together to scramble the data.  When you want to decode the data, you multiply the 'scramble' matrix by the inverse of the coding matrix.  This gives back the original matrix.  My guess is that the encryption system stores the coding matrix and the inverse (more likely just the inverse).

Let me know if you need more than this.

PS:  A 'Matrix Algebra' textbook from a college campus could probably help you with this; that's where I learned what I know.
0
 
LVL 3

Accepted Solution

by:
joao_patrao earned 300 total points
ID: 1020727
Hi there!

Please take a look at:
http://webopedia.internet.com/TERM/e/encryption.html

Here you can find many things that may interest you about encryption systems and so on...

Data encryption methods
http://www.catalog.com/sft/encrypt.html

International cryptography site
http://www.ssh.fi/tech/crypto/

good luck
Joao Patrao
0
Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

 
LVL 9

Expert Comment

by:rmarotta
ID: 1020728
Orifice,
You waited too long.........
0
 

Author Comment

by:Orifice
ID: 1020729
Thanks sorry if I was not able to answer sooner. Cookie problems. :)

Orifice
0
 

Author Comment

by:Orifice
ID: 1020730
Thanks sorry if I was not able to answer sooner. Cookie problems. :)

Orifice
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
For years I have put up with a wireless mouse that consistently disappears or is non-responsive.  This is the story of how I discovered it wasn't really the mouse!
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question