{"id":25,"date":"2014-01-05T17:55:25","date_gmt":"2014-01-05T17:55:25","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25"},"modified":"2014-01-05T17:55:25","modified_gmt":"2014-01-05T17:55:25","slug":"how-encryption-works-howstuffworks-computer","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/how-encryption-works-howstuffworks-computer.php","title":{"rendered":"How Encryption Works &#8211; HowStuffWorks &quot;Computer&quot;"},"content":{"rendered":"<p><p>    When we use the     Internet, we're not always just clicking around and    passively taking in information, such as reading news articles    or blog posts -- a great deal of our time online involves    sending others our own information. Ordering something over the    Internet, whether it's a book, a CD or    anything else from an online vendor, or signing up for an    online account, requires entering in a good deal of sensitive    personal information. A typical transaction might include not    only our names, e-mail    addresses and physical address and phone number, but also    passwords and personal identification numbers (PINs).  <\/p>\n<p>    The incredible growth of the Internet has excited businesses    and consumers alike with its promise of changing the way we    live and work. It's extremely easy to buy and sell goods all    over the world while sitting in front of a laptop. But    security is a major concern on the Internet, especially when    you're using it to send sensitive information between parties.  <\/p>\n<p>    Let's face it, there's a whole lot of information that we don't    want other people to see, such as:  <\/p>\n<p>    Information security is provided on computers and over the    Internet by a variety of methods. A simple but straightforward    security method is to only keep sensitive information on    removable    storage media like portable flash memory drives or external    hard drives. But the most popular forms of security all rely on    encryption, the process of encoding    information in such a way that only the person (or computer)    with the key can decode it.  <\/p>\n<p>    In this article, you will learn about encryption and    authentication. You will also learn about public-key and    symmetric-key systems, as well as hash algorithms.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/computer.howstuffworks.com\/encryption.htm\" title=\"How Encryption Works - HowStuffWorks &quot;Computer&quot;\">How Encryption Works - HowStuffWorks &quot;Computer&quot;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}