{"id":16063,"date":"2014-04-14T19:52:43","date_gmt":"2014-04-14T23:52:43","guid":{"rendered":"http:\/\/www.opensource.im\/?p=16063"},"modified":"2014-04-14T19:52:43","modified_gmt":"2014-04-14T23:52:43","slug":"what-is-cryptography-webopedia-webopedia-online-tech","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/what-is-cryptography-webopedia-webopedia-online-tech.php","title":{"rendered":"What is Cryptography? Webopedia &#8211; Webopedia: Online Tech &#8230;"},"content":{"rendered":"<p><p>Main  TERM  C            <\/p>\n<p>    The art of protecting information by transforming it (encrypting it) into an    unreadable format, called cipher text. Only those who    possess a secret key can decipher (or decrypt) the message into    plain text. Encrypted    messages can sometimes be broken by cryptanalysis, also called    codebreaking, although modern cryptography techniques    are virtually unbreakable.  <\/p>\n<p>    As the Internet and other    forms of electronic communication become more prevalent,    electronic security is    becoming increasingly important. Cryptography is used to    protect e-mail messages,    credit card information, and corporate data. One of the most    popular cryptography systems used on the Internet is Pretty Good    Privacybecause it's effective and free.  <\/p>\n<p>    Cryptography systems can be broadly classified into symmetric-key    systems that use a single key that both the sender and    recipient have, and public-keysystems    that use two keys, a public key known to everyone and a private    key that only the recipient of messages uses.  <\/p>\n<p>    TECH RESOURCES FROM OUR PARTNERS  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.webopedia.com\/TERM\/C\/cryptography.html\" title=\"What is Cryptography? Webopedia - Webopedia: Online Tech ...\">What is Cryptography? Webopedia - Webopedia: Online Tech ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Main TERM C The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-16063","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16063"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=16063"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16063\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=16063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=16063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=16063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}