Wiki source for encryption


Show raw source

====**Data Encryption**====
>>Process of disguising information as “ciphertext,” or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography). Computers encrypt data by applying an algorithm to a block of data. A personal key known only to the message's transmitter and intended receiver is used to control the encryption. Well-designed keys are almost impregnable. A key 16 characters long selected at random from 256 ASCII characters could take far longer than the 15-billion-year age of the universe to decode, assuming the perpetrator attempted 100 million different key combinations per second. Symmetric encryption requires the same key for both encryption and decryption. Asymmetric encryption, or public-key cryptography, requires a pair of keys, one for encryption and one for decryption.[[http://www.merriam-webster.com/concise/data+encryption?show=0&t=1378894662 Encyclopædia Britannica Concise]]>>
===File Encryption===
- [[gnupg GNU Privacy Guard]]

===Partition Encryption===
- TrueCrypt

===Web Search Encryption===
- https://www.startpage.com/

===Personal Communication Encryption===
- [[Pidgin]] with Off-the-Record (O.T.R.) Messaging
- [[Thunderbird]] with [[Enigmail]]

===Appendix===
~-Is your encrypted data safe?:
~~-Katherine Albrecht [[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 mp3]][1] [[http://podcast.gcnlive.com/podcast/k_albrecht/0909132.mp3 mp3]][2]
~~-[[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schnier]]
~-[[http://distrowatch.com/weekly.php?issue=20120528#qa Questions and Answers (by Jesse Smith): What are the advantages of encrypting and should the entire system be encrypted rather than just /home?]]
~-http://blog.cryptographyengineering.com/2013/03/here-come-encryption-apps.html

----
==Categories==
CategorySecurity
Valid XHTML :: Valid CSS: :: Powered by WikkaWiki