Solved

Information About Data Encrypting and Data Encryption Systems

Posted on 1999-01-19
6
220 Views
Last Modified: 2010-04-27
 Help! I need to know about data encryption and and several
data encryption  systems. I  also need information as to the
the significance of matrices and how they are used to encode
data.
  Thank you very much in advance!

Sincerely yours,
Orifice
0
Comment
Question by:Orifice
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 9

Expert Comment

by:rmarotta
ID: 1020725
I can't help you, but I suggest you delete the duplicate questions to have your points refunded, before someone "answers" them.
Ralph
0
 
LVL 1

Expert Comment

by:ZenMaster
ID: 1020726
As far as data encryption systems, I can't say I know much about them, but data encryption is another matter.

Matrices are used in encryption as coders and de-coders.  First, data in its raw form is translated into a matrix (there are numerous ways to do this; by character, by word, by 10-space block, etc.).  Then a coding matrix is formed, and the two are multiplied together to scramble the data.  When you want to decode the data, you multiply the 'scramble' matrix by the inverse of the coding matrix.  This gives back the original matrix.  My guess is that the encryption system stores the coding matrix and the inverse (more likely just the inverse).

Let me know if you need more than this.

PS:  A 'Matrix Algebra' textbook from a college campus could probably help you with this; that's where I learned what I know.
0
 
LVL 3

Accepted Solution

by:
joao_patrao earned 100 total points
ID: 1020727
Hi there!

Please take a look at:
http://webopedia.internet.com/TERM/e/encryption.html

Here you can find many things that may interest you about encryption systems and so on...

Data encryption methods
http://www.catalog.com/sft/encrypt.html

International cryptography site
http://www.ssh.fi/tech/crypto/

good luck
Joao Patrao
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 9

Expert Comment

by:rmarotta
ID: 1020728
Orifice,
You waited too long.........
0
 

Author Comment

by:Orifice
ID: 1020729
Thanks sorry if I was not able to answer sooner. Cookie problems. :)

Orifice
0
 

Author Comment

by:Orifice
ID: 1020730
Thanks sorry if I was not able to answer sooner. Cookie problems. :)

Orifice
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is about my first experience with programming Arduino.
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question