Protecting Data Through Encryption: Difference between revisions
Pspatafore (talk | contribs) No edit summary |
Pspatafore (talk | contribs) No edit summary |
||
Line 10: | Line 10: | ||
'''Algorithm''': | '''Algorithm''': | ||
The American Heritage Dictionary defines an algorithm as "a step-by-step problem-solving procedure, especially an established, recursive computational procedure for solving a problem in a finite number of steps." In the context of encryption, an algorithm is the mathematical formula used to scramble and unscramble data. It typically has two elements: data (for example, an email message that you want to encrypt or decrypt) and a key. | The American Heritage Dictionary defines an algorithm as "a step-by-step problem-solving procedure, especially an established, recursive computational procedure for solving a problem in a finite number of steps." In the context of encryption, an algorithm is the mathematical formula used to scramble and unscramble data. It typically has two elements: data (for example, an email message that you want to encrypt or decrypt) and a key. | ||
'''Asymmetric Cryptography''': (Also known as public key cryptography.) | |||
Encryption software that requires two keys: a public key and a private key. Encryption software users distribute their public key, but keep their private key to themselves. | |||
'''Authentication''': | |||
Assuring that a message has not been modified in transit or while stored on a computer is referred to as authentication. It is one of the objectives of cryptography. (This is referred to as message authentication or message integrity.) Assuring that a public key really belongs to a specific individual, or that a specific individual has the right to send a particular encrypted message is another type of authentication. |
Revision as of 02:45, 27 July 2010
Type text here
Algorithm:
The American Heritage Dictionary defines an algorithm as "a step-by-step problem-solving procedure, especially an established, recursive computational procedure for solving a problem in a finite number of steps." In the context of encryption, an algorithm is the mathematical formula used to scramble and unscramble data. It typically has two elements: data (for example, an email message that you want to encrypt or decrypt) and a key.
Asymmetric Cryptography: (Also known as public key cryptography.) Encryption software that requires two keys: a public key and a private key. Encryption software users distribute their public key, but keep their private key to themselves.
Authentication: Assuring that a message has not been modified in transit or while stored on a computer is referred to as authentication. It is one of the objectives of cryptography. (This is referred to as message authentication or message integrity.) Assuring that a public key really belongs to a specific individual, or that a specific individual has the right to send a particular encrypted message is another type of authentication.