Encryption & Decryption


DevX Home    Today's Headlines   Articles Archive   Tip Bank   Forums   

Results 1 to 3 of 3

Thread: Encryption & Decryption

Hybrid View

  1. #1
    Mu'tasem Guest

    Encryption & Decryption


    I want any Method About Encryption & Decryption and how this method work?

  2. #2
    Chris Boyle Guest

    Re: Encryption & Decryption


    "Mu'tasem" <mjar@usa.net> wrote:
    >
    >I want any Method About Encryption & Decryption and how this method work?



    Encryption is the transformation of data into a form that is as close to
    impossible as possible to read without the appropriate knowledge. Its purpose
    is to ensure privacy by keeping information hidden from anyone for whom it
    is not intended, even those who have access to the encrypted data. Decryption
    is the reverse of encryption; it is the transformation of encrypted data
    back into an intelligible form.

    There are two types of cryptosystems: secret-key and public-key cryptography
    . In secret-key cryptography, also referred to as symmetric cryptography,
    the same key is used for both encryption and decryption. The most popular
    secret-key cryptosystem in use today is the Data Encryption Standard

    In public-key cryptography, each user has a public key and a private key.
    The public key is made public while the private key remains secret. Encryption
    is performed with the public key while decryption is done with the private
    key. The RSA public-key cryptosystem is the most popular form of public-key
    cryptography. (RSA stands for Rivest, Shamir, and Adleman, the inventors
    of the RSA cryptosystem)

    The Digital Signature Algorithm (DSA) is also a popular public-key technique,
    though it can only be used only for signatures, not encryption. Elliptic
    curve cryptosystems (ECCs) are cryptosystems based on mathematical objects
    known as elliptic curves. Elliptic curve cryptography has been gaining in
    popularity recently. Lastly, the Diffie-Hellman key agreement protocol is
    a popular public-key technique for establishing secret keys over an insecure
    channel.



  3. #3
    Christian Olsson Guest

    Re: Encryption & Decryption


    I wouild like to take the opportunity to introduce you to Protegrity and Protegrity's
    Secure.Data Encryption and Privacy enforcement tool which enables companies
    to comply with the information-privacy legislation and legal requirements
    of the:

    1) U.S. Health Information Portability and Accountability Act (HIPAA) - compliance
    by October 2002 www.hipaacomply.com/;
    2) U.S. Gramm-Leach-Bliley Act (GLBA) (TITLE V--Consumer Privacy), regulated
    by the SEC, FTC, FDIC, OCC, OTS, FRB, NAIC, and NCUA, which covers a broad
    range of financial services and virtually affects any company who accepts
    credit cards - compliance July 1st, 2001 http://www.privacyheadquarters.com/r...research.html;

    3) European Union 95/46/EC Directive on Data Privacy http://europa.eu.int/comm/internal_market/en/dataprot/;

    4) E.U./U.S. Safe Harbor requirements www.export.gov/safeharbor
    5) Canadian Personal Information Protection and Electronic Documents Act
    (PIPEDA) www.privcom.gc.ca/;
    7) Visa U.S.A.'s Cardholder Information Security Program (CISP) - compliance
    by May 1st, 2001 www.visabrc.com/section.phtml?2,115;
    8) VISA International Account Information Security (AIS) Standards and Best
    Practices Guide https://www.visa.com/nt/gds/main.html; and
    9) BITS (the technology group for the Financial Services Roundtable) Voluntary
    Guidelines for Aggregation Services www.bitsinfo.org/FinalAggregationBook051601.pdf.


    Protegrity’s Secure.Data™ product suite is a one-of-a-kind technology. It
    is the only cryptographic data protection and key management solution commercially
    available today operating at the database column and row level. Most importantly,
    it is the only data-privacy enforcement solution supported within the major
    relational database vendors’ products (Oracle, Sybase ASE, Microsoft SQL
    2000 and IBM DB2) …with integration points directly within the code of some
    of these vendors’ software.

    Protegrity addresses data privacy and data protection at the actual data-storage
    level within the organization’s production corporate databases, specifically
    addressing the security and protection of data at-rest (persistent data)
    versus data in-transit. Secure.Data™ insures data privacy and integrity in
    an operationally on-line mode, transparently to applications. It is typically
    deployed in distributed databases, Web-enabled staging databases, and centralized
    mega-databases requiring cryptographic protection.

    Please see www.protegrity.com for more details. Please do not hesitate to
    contact me to discuss how Protegrity best can assist you in complying to
    the new HIPAA, GLBA, Safe Harbor, PIPEDA and Visa Cardholder Information
    Security Program requirements.



    Christian Olsson, Director Business Development
    Protegrity, Inc.
    www.protegrity.com
    christian.olsson@protegrity.com
    408-366-0417


    "Chris Boyle" <christopher_boyle@hotmail.com> wrote:
    >
    >"Mu'tasem" <mjar@usa.net> wrote:
    >>
    >>I want any Method About Encryption & Decryption and how this method work?

    >
    >
    >Encryption is the transformation of data into a form that is as close to
    >impossible as possible to read without the appropriate knowledge. Its purpose
    >is to ensure privacy by keeping information hidden from anyone for whom

    it
    >is not intended, even those who have access to the encrypted data. Decryption
    >is the reverse of encryption; it is the transformation of encrypted data
    >back into an intelligible form.
    >
    >There are two types of cryptosystems: secret-key and public-key cryptography
    >. In secret-key cryptography, also referred to as symmetric cryptography,
    >the same key is used for both encryption and decryption. The most popular
    >secret-key cryptosystem in use today is the Data Encryption Standard
    >
    >In public-key cryptography, each user has a public key and a private key.
    >The public key is made public while the private key remains secret. Encryption
    >is performed with the public key while decryption is done with the private
    >key. The RSA public-key cryptosystem is the most popular form of public-key
    >cryptography. (RSA stands for Rivest, Shamir, and Adleman, the inventors
    >of the RSA cryptosystem)
    >
    >The Digital Signature Algorithm (DSA) is also a popular public-key technique,
    >though it can only be used only for signatures, not encryption. Elliptic
    >curve cryptosystems (ECCs) are cryptosystems based on mathematical objects
    >known as elliptic curves. Elliptic curve cryptography has been gaining

    in
    >popularity recently. Lastly, the Diffie-Hellman key agreement protocol is
    >a popular public-key technique for establishing secret keys over an insecure
    >channel.
    >
    >



Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
HTML5 Development Center
 
 
FAQ
Latest Articles
Java
.NET
XML
Database
Enterprise
Questions? Contact us.
C++
Web Development
Wireless
Latest Tips
Open Source


   Development Centers

   -- Android Development Center
   -- Cloud Development Project Center
   -- HTML5 Development Center
   -- Windows Mobile Development Center