![]() AES is a symmetric encryption algorithm and does require a single key to protect and unprotect the data. The encryption algorithms are classified by a count of keys that are needed to encrypt (protect) and decrypt (unprotect) files. National Institute of Standards and Technology (NIST) in 2001 to secure the information from being exposed to or read by not authorized users. As an example, Advanced Encryption Standard (AES) specification was created by the U.S. There are a number of different specifications that can be used for data encryption. ![]() In reality, when you’re encrypting a file the data in the file is not changed but is transformed or translated to an unreadable form using an algorithm (a list of simple operations). Having a copy of the key the friend can open the box and find what’s inside. ![]() ![]() To make sure that no one opened the box we’re locking it with a key and sending the box to a friend. ![]() To make it simple let’s imagine a box with a keyhole that can be opened only with the key (password) you have. Document encryption is one of the ways how can we protect our files from being read by 3-d parties when sharing files that contain personal or private information over the Internet with our friends and colleagues. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |