Letter: Americans should be furious over the extent of NSA …

Americans should be furious over the extent of NSA spying

Over the past two weeks, I watched the two-part PBS Frontline investigation broadcast locally on WNED titled, The United States of Secrets. This was an engrossing yet chilling report on the secret NSA spy program that encompasses the intrusions into the privacy of all U.S. citizens as well as foreign entities. This is the program that began after 9/11 under President George W. Bush and has been expanded upon under President Obama.

I found myself becoming very angry while watching this program, perhaps more for the fact that both presidents continue to mislead and even lie to the American public about the scope of the spying rather than the actual privacy intrusion itself. Yes, many people will say: Oh, it doesnt affect me. I have nothing to hide. But this country was built upon the Constitution and our rights are being trampled under the guise of security from terrorism. Major U.S. Internet and communications providers are cooperating with the NSA in granting access to our emails, phone calls, messages, Skype calls and even our financial transactions.

I think the thing that may disturb me the most is the silence over this issue from the American public. In my opinion, Edward Snowden is a whistle-blower and should be applauded for his disclosures rather than ostracized and condemned as a criminal. Wake up, America, before its too late.

Bill McCarthy

Orchard Park

See more here:
Letter: Americans should be furious over the extent of NSA ...

What Are the Different Types of Encryption Methods?

There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. Hashing, for example, is very resistant to tampering, but is not as flexible as the other methods. All three forms of encryption rely on cryptography, or the science of scrambling data.

People use encryption to change readable text, called plaintext, into an unreadable secret format, called ciphertext. Encrypting data provides additional benefits besides protecting the confidentiality of a message. These advantages include ensuring that messages have not been altered during transit and verifying the identity of the sender. All of these benefits can be realized by using any of these encryption methods.

The first encryption method, called hashing, creates a unique, fixed-length signature for a message or data set. Hashes are created with an algorithm, or hash function, and people commonly use them to compare sets of data. Since a hash is unique to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering.

A key difference between hashing and the other two encryption methods is that once the data is encrypted, the process cannot be reversed or deciphered. This means that even if a potential attacker were able to obtain a hash, he or she would not be able to use a decryption method to discover the contents of the original message. Some common hashing algorithms are Message Digest 5 (MD5) and Secure Hashing Algorithm (SHA).

Symmetric cryptography, also called private-key cryptography, is one of the oldest and most secure encryption methods. The term "private key" comes from the fact that the key used to encrypt and decrypt data must remain secure because anyone with access to it can read the coded messages. A sender encodes a message into ciphertext using a key, and the receiver uses the same key to decode it.

People can use this encryption method as either a "stream" cipher or a "block" cipher, depending on the amount of data being encrypted or decrypted at a time. A stream cipher encrypts data one character at a time as it is sent or received, while a block cipher processes fixed chunks of data. Common symmetric encryption algorithms include Data Encryption Standard (DES), Advanced Encryption Standard (AES), and International Data Encryption Algorithm (IDEA).

Asymmetric, or public key, cryptography is, potentially, more secure than symmetric methods of encryption. This type of cryptography uses two keys, a "private" key and a "public key," to perform encryption and decryption. The use of two keys overcomes a major weakness in symmetric key cryptography, since a single key does not need to be securely managed among multiple users.

In asymmetric cryptography, a public key is freely available to everyone and used to encrypt messages before sending them. A different, private key remains with the receiver of ciphertext messages, who uses it to decrypt them. Algorithms that use public key encryption methods include RSA and Diffie-Hellman.

Read more from the original source:
What Are the Different Types of Encryption Methods?