TechArena Community What is the equation behind encryption

#1
12-05-2011
 Member Join Date: Mar 2011 Posts: 22
What is the equation behind encryption

What is the equation behind a encrypted message. We send and receive emails everyday and today digital signatures are used to authenticate a document. Now that is the just for the validation part. If I password protect a pdf file and sent it then does it is easily traceable. Can an unethical stuff access my data. I found that there are number of attacks they use on the document to reveal the data. Does today's technology is really strong enough to work with the same. Thanks.
#2
12-05-2011
 Member Join Date: Mar 2009 Posts: 1,221
Re: What is the equation behind encryption

There is always a need for encryption and protection on internet. Now today there ample of threats that effects your system and even a stronger security solutions do not provide you full protection. It is right to say that transactions made through the network can be intercepted, especially when it is difficult to implement law on internet. So that is the place where cryptography is needed. The word cryptography is a generic term for all techniques used to encrypt messages where others cannot read them easily.
#3
12-05-2011
 Member Join Date: May 2008 Posts: 1,304
Re: What is the equation behind encryption

Cryptology is essentially based on the arithmetic. It's in the case of a text to turn the letters that make up the message into a sequence of numbers and then make calculations on these figures. The higher the encryption is more secure your data is. The fact encode a message in such a way as to make secret is called encryption. The inverse method is to find the original message is called decryption. Today there are standard which cannot be encoded so easily.
#4
12-05-2011
 Member Join Date: Mar 2010 Posts: 295
Re: What is the equation behind encryption

Encryption is usually done using an encryption key and decryption key which si after required to decrypt the data. There are generally two types of keys as mentioned before. The first is the Symmetric keys. These keys used for encryption and for decryption. This is known as symmetric encryption or secret-key encryption. And then the second one which comes in the range is Asymmetric keys. These keys used in the case of asymmetric encryption which in other modes also called public key encryption.
#5
14-05-2011
 Member Join Date: Jun 2009 Posts: 908
Re: What is the equation behind encryption

By assigning a password to a document, you are establishing an encryption key that must be the recipient of the document so that it can open. This type of key is called a symmetric key, as it uses the same key for encryption and decryption. Password protection uses a symmetric key. Asymmetric keys, also known as public key cryptography, uses a combination of private and public key. There is advance algorithm working in the background which is not easy to understand and figure out.
#6
14-05-2011
 Member Join Date: Nov 2009 Posts: 948
Re: What is the equation behind encryption

Passwords provide the first level of protection to your PDF document. You can set passwords so that only authorized users can open the document and / or only those with permission to print, edit or copy the document. Other forms of security such as digital signatures and certificates, the party focused on providing different types of security needs. You can also protect the privacy of your PDF by applying standard rules for creating good passwords which is an combination of combine numbers and letters, create passwords of 8 or more characters.

 Tags: