

 Thread Tools  Search this Thread 
#1
 
 
What is the equation behind encryption What is the equation behind a encrypted message. We send and receive emails everyday and today digital signatures are used to authenticate a document. Now that is the just for the validation part. If I password protect a pdf file and sent it then does it is easily traceable. Can an unethical stuff access my data. I found that there are number of attacks they use on the document to reveal the data. Does today's technology is really strong enough to work with the same. Thanks. 
#2
 
 
Re: What is the equation behind encryption There is always a need for encryption and protection on internet. Now today there ample of threats that effects your system and even a stronger security solutions do not provide you full protection. It is right to say that transactions made through the network can be intercepted, especially when it is difficult to implement law on internet. So that is the place where cryptography is needed. The word cryptography is a generic term for all techniques used to encrypt messages where others cannot read them easily. 
#3
 
 
Re: What is the equation behind encryption Cryptology is essentially based on the arithmetic. It's in the case of a text to turn the letters that make up the message into a sequence of numbers and then make calculations on these figures. The higher the encryption is more secure your data is. The fact encode a message in such a way as to make secret is called encryption. The inverse method is to find the original message is called decryption. Today there are standard which cannot be encoded so easily. 
#4
 
 
Re: What is the equation behind encryption Encryption is usually done using an encryption key and decryption key which si after required to decrypt the data. There are generally two types of keys as mentioned before. The first is the Symmetric keys. These keys used for encryption and for decryption. This is known as symmetric encryption or secretkey encryption. And then the second one which comes in the range is Asymmetric keys. These keys used in the case of asymmetric encryption which in other modes also called public key encryption. 
#5
 
 
Re: What is the equation behind encryption By assigning a password to a document, you are establishing an encryption key that must be the recipient of the document so that it can open. This type of key is called a symmetric key, as it uses the same key for encryption and decryption. Password protection uses a symmetric key. Asymmetric keys, also known as public key cryptography, uses a combination of private and public key. There is advance algorithm working in the background which is not easy to understand and figure out. 
#6
 
 
Re: What is the equation behind encryption Passwords provide the first level of protection to your PDF document. You can set passwords so that only authorized users can open the document and / or only those with permission to print, edit or copy the document. Other forms of security such as digital signatures and certificates, the party focused on providing different types of security needs. You can also protect the privacy of your PDF by applying standard rules for creating good passwords which is an combination of combine numbers and letters, create passwords of 8 or more characters. 

Tags: cryptography, encryption, password, security 
Thread Tools  Search this Thread 

Similar Threads for: "What is the equation behind encryption"  
Thread  Thread Starter  Forum  Replies  Last Post 
Equation writer for iPad?  Steadfast  Portable Devices  7  02062011 03:50 PM 
How to break the encryption just getting the encryption algorithm  Neel Kamal55  Networking & Security  4  24122010 11:55 PM 
Assymetric encryption vs Symmetric encryption  "Dritan"  Networking & Security  4  23122010 08:37 AM 
How to solve quadratic equation using C program?  KALANI84  Software Development  5  26022010 04:39 PM 
Contivity VPN "Unable to complete encryption handshake with remote side. Encryption Mismatch."  HudSon  AntiVirus Software  2  22022006 03:53 PM 