Page 4,177«..1020..4,1764,1774,1784,179..4,1904,200..»

How Secure Is Cloud-Based Data Storage? – HuffPost

Do you trust "the cloud" to securely store computer files? originally appeared on Quora: the place to gain and share knowledge, empowering people to learn from others and better understand the world.

Answer by John L. Miller, Worked on several distributed and cloud storage services. PhD in distributed systems, on Quora:

Files stored in reliable cloud services are some of the most secure files you can have, provided you have good passwords. Google, Microsoft, and Amazon all provide reliable cloud services for consumer file storage.

Personally speaking, my home machines have lost hundreds of gigabytes of data (video, audio, and some important stuff) to hard disk failures. Ive neverlost anydata I put in cloud services.

Some cloud storage has versioning of files to help you recover from accidental deletes and overwrites.

Overall the cloud is a great place to securely store data.

This question originally appeared on Quora - the place to gain and share knowledge, empowering people to learn from others and better understand the world. You can follow Quora on Twitter, Facebook, and Google+. More questions:

See more here:
How Secure Is Cloud-Based Data Storage? - HuffPost

Read More..

Best Cloud Storage Solutions For Your Small Business – CBS Detroit

With the internet of things, cloud storage has become more than just a way to conserve business resources by storing files and data online. It has become an essential business tool. It allows users to share and collaborate on projects from any location using a variety of devices. Cloud storage is also a vital component of any security system. Storing critical backups on the company server has inherent dangers, such as ransomware attacks or system failures. Keeping backups in the cloud is the best way to ensure a quick recovery. Here is a rundown of the most popular options that provide all the cloud storage features small business owners need to safely share and store digital assets.

Dropbox

Dropbox is a favorite among users. It is known for its reliability and compatibility with other services. Users can integrate with Microsoft Office Online to edit stored Word, PowerPoint and Excel files. To collaborate on a document, simply create a shared folder and set permissions. Dropbox offers 2 GB of free storage. An upgrade to Dropbox Plus is $99 a year and expands storage space to 1 TB.

Google Drive

Google Drive really shines when it comes to collaborating. The intuitive dashboard allows users to quickly set permissions for each file stored in the cloud. Gmail, Google Docs, Google photos and Google Calendar all work together seamlessly with Google Drive. With a few clicks, users can save Gmail attachments to Google Drive for storage. The first 15 GB of storage is free. Upgrades start at $19.99 a year for 100 GB of storage.

Microsoft OneDrive

OneDrive is built into the Windows operating system making it easy to sync Windows devices. Documents, photos and videos are automatically organized and tagged. Microsoft offers 5 GB of free storage. Premium plans, starting at $6.99 a month, expand storage capacity and come with the newest versions of MS Word, PowerPoint, Excel and OneNote.

IDrive

IDrive is another great way to store your backups of files and databases. It has multiple backup and data restoration options, and file size is unlimited, which is an important consideration when doing complete website backups. There is up to 5 GB of storage available for free. An upgrade to 2 TB is $69.50 per year.

Box

Box is loaded with privacy and sharing options making it ideal for collaborative projects. Users can upload almost any type of file, add comments to shared documents, assign tasks and receive notifications when a file has been changed. Business plans start at $5 per month. This includes access for three to 10 users and 100 GB of storage.

This article was written by Gillian Burdett for CBS Small Business Pulse

Read this article:
Best Cloud Storage Solutions For Your Small Business - CBS Detroit

Read More..

Deals: A Lifetime Of 2TB Cloud Storage For 90% Off – Gizmodo Australia

Free speech is often raised as a defence in the court of public opinion, particularly when people are called out by their ideological opponents. Youre attacking my right to free speech! However, either through forgetfulness or ignorance, many Australians dont appear to realise free speech is not a legal right they hold.

A year after the disastrous Galaxy Note7, Samsung is back with another Note, its flagship big-screen smartphone that is the best it'll build in 2017. Welcome to the Note8 -- it's a masterpiece, an agenda-setting phone that's the first of a new breed of devices that could well replace your entire PC.The Galaxy Note8 faces stronger competition than ever, but that's a great thing for you, the customer. It catches up to Apple and its competitors with an excellent dual camera, and it streaks ahead with the best screen of any phone ever. If this is the benchmark for top-end phones, I'm really excited to see what this forces everyone else to come up with.

More:
Deals: A Lifetime Of 2TB Cloud Storage For 90% Off - Gizmodo Australia

Read More..

Canon USA Advances PRISMAsync Color Print Server in Version 5.2, Offering Cloud-Based PRISMAlytics Dashboard … – PR Newswire (press release)

Canon will debut PRISMAsync Print Server v5.2 at PRINT 17 (booth #1213), held in Chicago, Illinois from September 10 to September 14, 2017.

"The evolution of the PRISMAsync family of print servers reflects Canon's technological leadership and our focus on creating products that can help users increase productivity and maximize efficiency," said Toyotsugu Kuwamura, executive vice president and general manager, Business Imaging Solutions Group, Canon U.S.A., Inc. "Productivity is an evolving term and means so much more than just the number of pages printed per minute in today's market. The new tools and features of the PRISMAsync solution are designed specifically to help print providers keep operators efficient and their imagePRESS engines running, as is our effort to maintain the functionality and user interaction of the PRISMAsync platform for color and monochrome presses as uniform as possible."

Among new features included with PRISMAsync Color Print Server v5.2 are:

PRISMAlytics Dashboard1-A cloud-based service that collects, organizes and displays performance trends from PRISMAsync driven digital presses running on version 5.2 or later. It records press data and transforms it into an easy-to-access and interpret dashboard, displaying usage, production and consumption-related information. This fact-based dashboard can help print floor managers study press performance on a daily basis as well as analyze trends over time, which can help them identify areas of improvement as a basis to take actions and bring higher efficiency to their production environment.

Extended and Automated Color Management Tools - For color critical environments, PRISMAsync Print Server v5.2 brings new color controls that can be implemented on a job or system-wide basis, helping operators produce each job with high quality. From optimized black point compensation to special saturation rendering, operators can be confident a full range of tools for producing the best color are at hand.

In addition, with PRISMAsync v5.2 for the imagePRESS C10000VP/C8000VP, the presses' Inline Spectrophotometric Sensors (ILS) can be used for color calibration and ICC output profile creation. Rather than relying on measuring color targets by hand, the imagePRESS C10000VP Series presses will be able to automatically print and measure color patches (including G7 targets), creating custom ICC output profiles in just a few minutes and with no operator intervention after initiation.

"We chose PRISMAsync to drive our imagePRESS color digital presses because G7 calibration is built into the RIP and there is no need for add-ons or third-party software," said Brad Steven, IT/Digital Production Manager at Print-Tech, a G7 Master Qualified Printerin Ann Arbor,Michigan. "The efficiency and productivity of PRISMAsync print server and imagePRESS C10000VP is phenomenal. Our color calibration continues to be spot on. We are excited to implement the new release of PRISMAsync Version 5.2; it is expected to cut the time it takes to perform our in-RIP G7 calibration and color profiling nearly in half while assuring even greater consistency of measurement."

New Scan/Copy Features - For copy/scan-intensive print operations such as in-plants, full support of Lightweight Directory Access Protocol (LDAP) search when scanning to email and a new simplified "Easy Copy" screen have been implemented, helping to bring new efficiencies to these environments. Furthermore, v5.2 enables user interface configuration by user role, allowing administrators to limit available settings and options for certain roles to better fit their operation's workflow or task division.

PRISMAsync Print Servers are key components of the PRISMA Suite - Canon's integrated suite of workflow essentials for production print. Designed to optimize the print production workflow from job submission to completion; enabling users to adapt, evolve and grow within ever-changing production print environments.

PRISMAsync Color Print Server v5.2 is now available through Canon Authorized Dealers and Canon Solutions America for imagePRESS C10000VP/C8000VP, imagePRESS C850/C750 and brings the relevant functionality in line with the PRISMAsync platform for varioPRINT monochrome digital presses. For current PRISMAsync users, Canon makes a strong effort to allow the field upgrades to keep the PRISMAsync feature and usability level aligned with newly sold devices. As such, version 5.2 is now also available for imagePRESS C800/C700 and imagePRESS C70xxVPS Series2.

The new PRISMAlytics Dashboard is scheduled to be available from October 2017.

For more information about Canon U.S.A., visit http://www.usa.canon.com.

About Canon U.S.A., Inc.

Canon U.S.A., Inc., is a leading provider of consumer, business-to-business, and industrial digital imaging solutions to the United States and to Latin America and the Caribbean markets. With approximately $29 billion in global revenue, its parent company, Canon Inc. (NYSE: CAJ), ranks third overall in U.S. patents granted in 2016. Canon U.S.A. is committed to the highest level of customer satisfaction and loyalty, providing 100 percent U.S.-based service and support for all of the products it distributes in the United States. Canon U.S.A. is dedicated to its Kyosei philosophy of social and environmental responsibility. In 2014, the Canon Americas Headquarters secured LEED Gold certification, a recognition for the design, construction, operations and maintenance of high-performance green buildings. To keep apprised of the latest news from Canon U.S.A., sign up for the Company's RSS news feed by visiting http://www.usa.canon.com/rss and follow us on Twitter @CanonUSA. For media inquiries, please contact pr@cusa.canon.com.

Based on weekly patent counts issued by United States Patent and Trademark Office.

Availability and specifications are subject to change without notice. Prices are set by dealers and may vary.

All referenced product names, and other marks, are trademarks of their respective owners.

1PRISMAsync System Version 5.2, enablement of data transfer via the Web, PRISMAlytics license and Google or Microsoft account required to gain access to PRISMAlytics. Subscription to a third party service required. Google and Microsoft accounts are subject to Google's and Microsoft's terms and conditions, respectively. Neither Canon, Inc., nor Canon U.S.A., Inc. represents or warrants any third party product, service or feature referenced hereunder.

2PRISMAlytics Dashboard is not supported for imagePRESS C7000VPS Series/C7010VPS Series/C7011VPS Series.

Canon U.S.A. website: http://www.usa.canon.com

For sales information/customer support: 1-800-OK-CANON

View original content with multimedia:http://www.prnewswire.com/news-releases/canon-usa-advances-prismasync-color-print-server-in-version-52-offering-cloud-based-prismalytics-dashboard-and-additional-functionality-300515633.html

SOURCE Canon U.S.A., Inc.

http://www.usa.canon.com

See the original post here:
Canon USA Advances PRISMAsync Color Print Server in Version 5.2, Offering Cloud-Based PRISMAlytics Dashboard ... - PR Newswire (press release)

Read More..

Keeping Your Files Safe in Google’s Cloud – New York Times

Q. When I upload a file to the Google Drive cloud, where is it actually stored, and is it protected from hackers?

A. According to Google, the files you add to your Google Drive app or folder are stored on servers in secure data centers. Your data stored with Google is encrypted during transfer from your computer and while it sits on Google Drive servers. (Many online file-storage sites offer similar protection, but check before you sign up if you have security concerns.)

Cloud services are often targets for thieves, but personal security by the account holder is often the weak link. Google recommends using two-step verification on Google Drive accounts to add an extra layer of protection, and it says to always fully log out of your account when using shared or public computers. The Safety Center area of the companys website has other tips and tools for many of its products, including Gmail, Android and Chrome.

In addition to providing a place to store files, Google Drive includes Google Docs, an online software suite for creating and collaborating on documents, spreadsheets and presentations. This summer, the company announced a desktop app for Windows and Mac, called Backup and Sync, that keeps Google Photos and Google Drive files backed up online.

Google Drive has been around since 2012, and some people have raised concerns about Googles scanning user content for its own purposes, like selling targeted advertising. The companys overall Terms of Service document states, Our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received and when it is stored.

Googles terms are not unlike those of other companies offering similar services and can be seen as the price of free. If they bother you, you can look for a different service with more agreeable terms or encrypt the stored data yourself.

Read the original here:
Keeping Your Files Safe in Google's Cloud - New York Times

Read More..

5 Reasons SD-WAN, 4G LTE Are Cloud Essentials – No Jitter

5 Reasons SD-WAN, 4G LTE Are Cloud EssentialsThese technologies provide critical WAN edge infrastructure for seamless and elastic connectivity to the cloud -- and an optimal user experience.

These technologies provide critical WAN edge infrastructure for seamless and elastic connectivity to the cloud -- and an optimal user experience.

Businesses of all sizes across many industries are embracing cloud-based IT solutions in lieu of traditional on-premises server deployments, but wide-area network (WAN) implications brought about by this transition aren't immediately recognized.

Cloud-based applications for office automation, Web and video conferencing, file sharing, VoIP and collaboration -- including Microsoft 365, Cisco Spark, Slack, Box, and others -- are proliferating due to the reduced cost and complexity associated with rolling out and managing these services across a distributed enterprise.

However, unified communications- and other software-as-a-service (SaaS) applications create new demands on underlying WAN infrastructure, especially for remote branch sites. Two emerging WAN technologies make it easier for businesses to update their WAN infrastructures for the cloud era: software-defined WAN (SD-WAN) and 4G LTE.

Here are five reasons SD-WAN and 4G LTE provide essential capabilities for ensuring reliability and optimal performance of cloud-based applications:

In the cloud era, SD-WAN and 4G LTE technologies provide essential WAN edge infrastructure for seamless and elastic connectivity to the cloud -- and an optimal user experience.

Read the original:
5 Reasons SD-WAN, 4G LTE Are Cloud Essentials - No Jitter

Read More..

Huawei ups its bet on cloud computing with broader support for Microsoft apps – GeekWire

Huawei and Microsoft executives sign an expanded cloud computing partnership. (Huawei Photo)

Huaweis bid to be a player in Chinas cloud computing scene got a little stronger Tuesday with the signing of a deal with Microsoft to host more of the software giants apps on its cloud.

Just five months into the making of Huaweis public cloud strategy, the two companies signed a deal that will see more of Microsofts enterprise technology software become available on Huaweis public cloud. Huawei launched its public cloud service in April with support for Windows Server and RDS (relational database service) for SQL Server, but customers running other Microsoft apps on-premises will now be able to take advantage of a cloud option for those apps through the new partnership.

Cloud computing in China is the domain of home-grown companies, with Alibaba as the countrys leading provider of cloud computing services. Baidu and Tencent are also going after cloud customers, while U.S. companies like Amazon Web Services and Microsoft operate their cloud services through a local subsidiary. The overall market is a little behind where the global cloud computing market is at the moment, but demand for cloud services in China is expected to surge over the next decade.

Microsoft and Huawei will cooperate on bringing new services to Huaweis customers, the two companies said in a statement. The announcement kicks off the Huawei Connect 2017 conference, which is being held in Shanghai.

Read the original here:
Huawei ups its bet on cloud computing with broader support for Microsoft apps - GeekWire

Read More..

How The Automotive Industry Is Leveraging Cloud Computing – CXOToday.com

The Volkswagen Group, the worlds second largest car manufacturer, is planning to use open-source cloud-computing platforms in order to build a private cloud to host websites for its brands Audi, VW, and Porsche. The company is also looking at a comprehensive platform for innovative automotive technology. In fact, VW officials debated for a long time over how to leverage the technology. The Group employs over 600,000 employees globally and of them, there are 11,000 who are internal IT experts.

They first plan to build private cloud to span the thousands of physical nodes across multiple data centers in the USA, Europe, and Asia. The automotive giant then eventually plans to build public cloud in order to create a hybrid cloud. The automobile giant has evolved from a car manufacturer to a global mobility provider and realizes the need to move away from traditional application development processes to those which are agile and can sustain rapid development. For new mobility services, Volkswagen will collect data, analyze it, and store it to make better products for its customers. These are real cases of digital transformation. Volkswagen is in fact one of the many automotive companies that are leveraging transformational technologies for a digital future.

Massive expansion predicted for cloud services globally

Cloud computing is one of the most disruptive forces facing the industry. According to the Bain & Company research report The Changing Faces of the Cloud, globally, the cloud IT market revenue is projected to increase to $390 billion in 2020 from $180 billion, translating into a compound annual growth rate (CAGR) of around 17%. The scale of change is mind-boggling.

The overall global public cloud market will mature, and its growth rate will slightly slow down from 17.2% in 2016 to a 15.2% increase in 2020, says Sid Nag, research director at Gartner. While Brexit and other growth challenges exist, some segments such as financial SaaS applications and the PaaS user markets will still see strong growth through 2020. As buyers intensify and increase IaaS activity, they will be getting more for their investment: ongoing enhancement of performance, more memory, more storage for the same money (which will drive increases in consumptions) and increased automation in traditional IT outsourcing (ITO) delivery, added Nag.

Cloud computing is radically changing the face of the automobile industry

The change is not cosmetic but radical in all aspects and could be truly transformational as it will power and define business processes and supply chains. These are companies genuinely trying to change everything: from the way their structure is managed to the products they sell.

We live in a world where innovation is the only constant. The world is witnessing unprecedented change driven by digital revolution. Everything is changing from how organizations function to how people work. Digital transformation is the buzzword across industries and cloud-based tech is leading that digitalization of processes and supply chains, said Shashank Dixit, CEO, Deskera, a global cloud provider.

Automotive companies are leveraging modern Cloud-computing platforms for creating Cloud native Applications, Operating System, the Internet of Things (IoT), devising a comprehensive software development methodologyall of which have the potential to literally transform it into a global powerhouse. As the company strives to explore new markets, it is overhauling everything that defines the core of its business and moving towards being a software services company, away from its hallmark of being a leading automaker. The bold move will perhaps lay the blueprint of how automobile enterprises of the future will keep reinventing themselves.

Read the rest here:
How The Automotive Industry Is Leveraging Cloud Computing - CXOToday.com

Read More..

Why You Should Be Encrypting Your Devices and How to Easily Do It – Gizmodo

Is the data on your phone or laptop encrypted? Should it be? And what does encrypting your data do to it anyway? Here well explain the ins and outs of encryption, and how you can make sure that everything in your digital life is safe from prying eyes.

Despite some of the complicated math involved, encryption isnt difficult to understandsimply put, it locks your files and data away using a secret code, just like a pair of spies might talk in code to hide what theyre really saying. If anyone else overhears that conversation, it sounds like gibberish, and its the same with encrypted files.

To make sense of encrypted data, you need the key to the code, which on your phone is often your PIN numberget past the lock screen, and your files and apps are no longer gibberish. Thats why being able to unlock an encrypted phone is so important to making sense of the data on it.

It applies to data we have stored on our devices and data we send through the air, to and from the internet. Apps with end-to-end encryption cant be spied on, much to the chagrin of law enforcement agencies and governments worldwide, and only the sender and intended recipient gets to see the real message.

You can go a long way down into the technical details of encryption, but it essentially just scrambles the data. The number of bits is often listed next to the type of encryption being used tell you how many possible combinations there are for the unlock codesomething locked with 256-bit encryption would take a bank of supercomputers billions of years to decode using brute force alone.

If the disk is not encrypted your device can easily be booted off a USB drive and the unencrypted data extracted, explains cybersecurity expert Professor Alan Woodward from the University of Surrey. You can even just take out the hard drive and mount it on another machine to examine data unless the disc is encrypted.

Different types of encryption algorithms have been developed for different purposes, with varying compromises between complexity and speed, though most of the time you wont have to worry about which flavor of encryption youre using (most of the time you just wont get a choice).

For example, the encryption on the iPhone is the 256-bit AES standard also used by the US military, which has the benefit of being both very speedy to apply and impossible to crack by running through the various unlock code combinations, as weve already pointed out.

If you do get a choice, Professor Woodward recommends looking for packages and encryption methods that have gone through some kind of public audit or independent testing to verify the methods used.

In some cases, such as the encryption supplied by Apple and Microsoft, you have little choice but to accept their assurances, but if using a third-party package look for audits, he told Gizmodo. Its the same as with secure messaging apps, its a sign of how robust the developers believe their system to be if they put it up for scrutiny.

If your data isnt encrypted, anyone who happens across your phone or laptop can get at the files within pretty easily; with encryption added, accessing the same data becomes very, very difficult (though not impossible, if other security loopholes can be found on the device). But do you need it in place if youre not carrying government secrets or company financials with you?

As security expert and Chief Technology Officer at IBM Resilient Bruce Schneier puts it in his blog: Encryption should be enabled for everything by default, not a feature you turn on only if youre doing something you consider worth protecting.

This is important. If we only use encryption when were working with important data, then encryption signals that datas importance. If only dissidents use encryption in a country, that countrys authorities have an easy way of identifying them. But if everyone uses it all of the time, encryption ceases to be a signal.

Even if you dont mind the thought of other people rifling through your folders of GIFs and angry letters to your Internet Service Provider, any device you own contains a wealth of information about you thats best kept private, from contacts to browsing histories.

Whether you think it worth doing is really whether you think your device has valuable data, says Professor Woodward. Youd be surprised what you do have: Contacts, emails, passwords. People underestimate the value of these to criminals. So, on the whole I think it is worth doing.

Youre building a wall between everything on your phone or computer, and anyone else who might want to look at it who isnt you. The good news is, encryption has become so important that a lot of devices now include it by default, so you dont necessarily need to do anything to stay protected.

iOS has been encrypting data for years, and encryption is now switched on by default in macOS as well: To check, open System Preferences, click Security & Privacy, then open the FileVault tab. If encryption isnt enabled, you can start the process here, and Apple has more information on its official support page.

After lagging behind iPhones for several years, just about all new Android devices are also now encrypted by default, as long as theyre running Android 6.0 Marshmallow or later. If your Android device isnt encrypted, and can be encrypted with its current OS version, then youll find the option by tapping the Security link in Settings.

That just leaves Windowssome PCs that ship with Windows 10 come with something called Device Encryption enabled, as long as you set it up and sign in with a Microsoft account. To check if this applies to you, from Settings click System then About and see if theres a Device Encryption section at the bottom.

If you dont have Device Encryption on your machine then the next option is BitLockerbut that requires upgrading to Windows 10 Pro. You may think the $100 is worth it, but free options, like the open source VeraCrypt, are available as well.

Were not going to go into too much detail about the data traveling to and from your devices, but encryption applies here toowith encryption in place, if someone should intercept the data going to or leaving from your computer, they wont be able to make sense of it.

A lot of apps apply encryption by default, and its also added when you connect to HTTPS sites such as Facebook, Gmail, Amazon and many others. Adding a password to your Wi-Fi network at home encrypts the data moving across it, and if youre using a public Wi-Fi network that anyone can access you should consider installing a VPN to encrypt your data and keep it scrambled.

Finally, its important to remember that nothing keeps your devices 100 percent protected, not even encryption (though it of course goes a long way towards doing that)dont think because your phone or laptop is encrypted you can become complacent about all the other precautions you need to put in place to stay safe.

Original post:
Why You Should Be Encrypting Your Devices and How to Easily Do It - Gizmodo

Read More..

Encryption Explained – Arizona Daily Wildcat

An indicator that a tool or system is working well, especially in programming, is that you never have to think about it. It can chug along in the background, without us giving it any attention. Imagine that using your refrigerator required an intimate understanding of endothermic reactions, or that opening it required a complete mechanical comprehension of how a compressor works.

Thankfully, it doesnt, and all we need to know is how to open and shut the door. The same goes for encryption.

Its likely that you used some form of encryption today. Whenever you log into a website, encryption protects your information while its sent to its destination. Most smart phones and computers also use some form of encryption to protect their contents. This encryption is what caused the controversy surrounding the FBIs demand for Apple to break into one of the San Bernardino shooters phones.

If it werent for encryption, services such as online banking and social media wouldnt exist, and while digital encryption is relatively new on the timeline of human existence, the practice of obfuscating communication is not.

Encryption grew out of cryptography, the art of writing and solving codes. Though various forms of cryptography have existed for thousands of years, one of the first and most recognizable forms of encryption was used by Julius Caesar. Dubbed the Caesar Cipher, it works by simply shifting all the letters in the alphabet by some fixed number.

RELATED:UA astronomers make observations on blinking brown dwarfs

So if the number is three, the letter "A" becomes "D," "Y" becomes "B" and "HELLO" becomes "KHOOR". To decrypt the message, you just shift all the letters back by three. Though this is a simple and specific example, it adheres to the main ideas of how encryption works.

Anything encrypted uses some variation of two main components, a cipher text and a key. The cipher text is the message after its been encrypted and the key is the algorithm used to turn the cipher text back into readable text. In the previous example, "KHOOR" was the cipher text and the number three was the key. Modern encryption algorithms hold trueo these two main concepts but are vastly more complex.

An encryption system is only as good as the number of possible keys to decrypt it. Being limited by the alphabet, the Caesar Cipher has just 25 possible keys, and a computer could try all 25 in the blink of an eye. As the popularity of computers grew, so did the need for encryption systems that are difficult for computers to crack.

Algorithms were needed that were difficult for a computer to solve, but easy for a computer to confirm that a provided solution was correct. One way this was achieved was by creating algorithms with so many possible keys that it would take an eternity for a computer to crack it.

Throughout the digital revolution, mathematicians and computer scientists employed various encryption methods until we arrived at two main schools of thought regarding encryption: symmetric and asymmetric cryptography.

In symmetric cryptography, the same key is used to encrypt and decrypt the cipher. This type of encryption is most often associated with computer hardware, such as encrypting your hard drive, because its simplicity makes it less resource-demanding and therefore more efficient.

RELATED:UA study finds distrust a unique phenomenon

Asymmetric encryption, also known as Public Key Cryptography, relies on two separate keys. The first is the public key, which is the key that can be safely shared with others to encrypt a message. The second key is the private key, which is the only thing that can decrypt something encrypted with the associated public key.

The basic idea is that I can send you my public key, which you use to encrypt a message that you send to me. I then use my private key to decrypt your message. This makes asymmetric encryption perfect for things such as authenticating passwords when you log into a website.

All major cryptographic systems today are in one of these two categories, though each category contains countless different encryption algorithms, each with strengths and weaknesses. An important way weaknesses are addressed is a principle by Claude Shannon, called Shannons Maxim. It states that "one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them." This essentially means that an algorithm should be able to be released to the public without this making it easier to be cracked.

As you can probably tell, theres a lot to be said about encryption and its role in our world today. These ideas are just the tip of the iceberg; theres still a great deal to be learned. As always, gaining a better understanding of how things work only stands to broaden our worldview as well as satisfy our curiosity. As our friend Claude Shannon once said, "I just wondered how things were put together."

Follow Brian Winkler onTwitter

Here is the original post:
Encryption Explained - Arizona Daily Wildcat

Read More..