Get Tech: Understand Computers, the Internet and Cut Through the AI Hype. A crash course for non-techie entrepreneurs. by Emmanuel Maggiori
Author:Emmanuel Maggiori [Maggiori, Emmanuel]
Language: eng
Format: epub
Published: 2020-12-05T23:00:00+00:00
9
Encryption
Internet messages travel around the world through wires and Wi-Fi signals. An intruder could easily tap into those channels to snoop into other peopleâs private communication. A really wicked eavesdropper could even alter the content of the intercepted message, causing serious trouble. Communicating through the Internet is as private as writing a message on a postcard: everyone can read it along the way, including the postman, your neighbors and your housemates.
Your business is likely to receive sensitive data from clients over the Internet, such as their credit card numbers or personal ID information. It is also likely to send sensitive data to clients and other businesses, such as invoices and account balances. You wouldnât want any intruders to read those messages. In this chapter, weâll see how online communication is secured and Iâll share my advice for keeping you and your customers safe.
Encryption
If you want to send a message to a friend but keep it a secret, you have to obscure it in a way that only you and your friend know. For example, you could replace every letter in the original message with the next letter in the alphabet. âAâ becomes âB,â âBâ becomes âC,â and so on. By using this strategy, the word âhelloâ is transformed into this apparent nonsense:
ifmmp
A snooper isnât able to understand the actual content of your message. This process is known as encryption. Your friend can easily decrypt the message by âundoingâ the encryption algorithm, replacing every letter by the previous one in the alphabet. âCâ becomes âB,â âBâ becomes âA,â and so on.
The problem with this approach is that the secrecy lies in the encryption algorithm itself. Anyone who knows the technique to encode the letters can crack the message.
The solution is to add a password or key to the mix. Suppose that, instead of jumping one letter in the alphabet, you use a secret key to indicate how many letters to jump. For example, key â5â means that you skip five letters in the alphabet. The same message is encrypted in different ways depending on the key:
hello + key 1 = ifmmp
hello + key 2 = jgnnq
Your friend needs to know the value of this key in order to properly apply the decryption algorithm and read the original message. Knowing the encryption algorithm itself is of little value without the key. In fact, everyone could agree on using the same algorithm, but they would make sure that only the intended recipient knows the key. The overall process looks as follows:
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7807)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6804)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6801)
Running Windows Containers on AWS by Marcio Morales(6321)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5048)
Combating Crime on the Dark Web by Nearchos Nearchou(4621)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4573)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4312)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3875)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3533)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3491)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
