HOME |  BACK |  NEXT |  _  WORDLIST |  TOPICS |  _  AUTHORS |  E-MAIL |  _  INDEX | -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

WWWE Logo Encryption

Encryption is a means of protecting information from unauthorized viewing or use. This is particularly important during transmission of data, or when it is stored on a transportable medium; at such times data is particularly vulnerable. Encryption systems can benefit the ordinary WWW user; when you need to send a really private email messages, or to order an item online including credit card information, you need an encryption system.

Most encryption systems are based on a one or two key system, without which the information cannot be decoded. A system that uses one key is called a private key system; such a system requires that both the sender and recipient have the same secret private key. A public key system of encryption uses two keys, the public key can be given out to anyone, but the private key is secret. A message sent by a public key system can be encrypted using either the public or the private key, once received, this message can then be decrypted by using the other key.

Two of the better known encryption systems are: the Data Encryption Standard and the Rivest Shamir, and Adelman (RSA) algorithm. Data Encryption Standard, or DES, developed by the U.S. National Bureau of Standards, is a one key, government standard algorithm for encrypting and decrypting data. Because DES has been around since 1975, it is available for many platforms, including Mac and PC. The RSA encryption system is another popular system and is widely thought to be unbreakable. The RSA encryption system is a two key system.

URLs:

comp.security.misc
This is a USENET newsgroup which discusses privacy and encryption.
ftp.rsa.com/pub/faq/faq.asc
The RSA Frequently Asked Question archive details the working of public key encryption systems.

W3E References:

Public key encryption
RSA (Rivest Shamir Adelman)

Print Reference:

Detail:

One of the reasons that some netizens are leary of a government sponsored encryption program can be traced to the Clipper Chip proposal of the early 1990's. The Clipper Chip was a U.S. government proposal that would have provided a standard encryption format for electronically transmitted data. It had the drawback of including a "backdoor" that would be available to law enforcement agencies to use for electronic eavesdropping. This eavesdropping would have been subject to the same restrictions as are currently applied to wiretapping. The disadvantage of employing a system that is known to have a "backdoor" is that such paths make the system more vulnerable to unauthorized access.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

E-Mail: The World Wide Web Encyclopedia at wwwe@tab.com
E-Mail: Charles River Media at chrivmedia@aol.com
Copyright 1996 Charles River Media. All rights reserved.
Text - Copyright © 1995, 1996 - James Michael Stewart & Ed Tittel.
Web Layout - Copyright © 1995, 1996 - LANWrights & IMPACT Online.
Revised -- February 20th, 1996