|
The below is a sample preview of the full essay that is available in our database. To see
the full paper, just register for a free account. You get
access to thousands of example term papers in our super free essay database without paying
a cent.
|
Beginning of Paper
A Look at Public Key Encryption
Encryption is the process of disguising information by transforming
plain text into gibberish, or ciphertext, which cannot be understood by an
unauthorized person. Decryption is the process of transforming ciphertext
back into plaintext that can be read by anyone. Example of enc ....
|
|
Middle of Paper
.... used by Captain Video but these algorithms are complex enough that
if you tried to crack them it would take you decades with even the most
powerful computer today. This complex mathematical code is what makes the
text secure to anyone who tries to crack it. Some similarities we can find
in these two examples are their use of the key, the unlocking instructions,
to decode the message. They only used one key to encrypt and decrypt the
messages. This creates problems, security problems. The single key must
itself be kept very secret, while somehow still being transmitted to the
person rece ....
|
|
|