{"id":30527,"date":"2015-07-30T17:40:14","date_gmt":"2015-07-30T21:40:14","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/security-encryption-systems-howstuffworks.php"},"modified":"2015-07-30T17:40:14","modified_gmt":"2015-07-30T21:40:14","slug":"security-encryption-systems-howstuffworks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/security-encryption-systems-howstuffworks.php","title":{"rendered":"Security Encryption Systems &#8211; HowStuffWorks"},"content":{"rendered":"<p><p>    Computer encryption is based on the science of     cryptography, which has been used as long    as humans have wanted to keep information secret. Before the    digital age, the biggest users of cryptography were    governments, particularly for military purposes.  <\/p>\n<p>    The Greek historian Plutarch wrote, for example, about Spartan    generals who sent and received sensitive messages using a    scytale, a thin cylinder made out of wood. The    general would wrap a piece of parchment around the scytale and    write his message along its length. When someone removed the    paper from the cylinder, the writing appeared to be a jumble of    nonsense. But if the other general receiving the parchment had    a scytale of similar size, he could wrap the paper around it    and easily read the intended message.  <\/p>\n<p>    The Greeks were also the first to use ciphers, specific codes    that involve substitutions or transpositions of letters and    numbers.  <\/p>\n<p>    As long as both generals had the correct cipher, they could    decode any message the other sent. To make the message more    difficult to decipher, they could arrange the letters inside    the grid in any combination.  <\/p>\n<p>    Most forms of cryptography in use these days rely on computers,    simply because a human-based code is too easy for a computer to    crack. Ciphers are also better known today as algorithms,    which are the guides for encryption -- they provide a way in    which to craft a message and give a certain range of possible    combinations. A key, on the other hand, helps    a person or computer figure out the one possibility on a given    occasion.  <\/p>\n<p>    Computer encryption systems generally belong in one of two    categories:  <\/p>\n<p>    In the following sections, you'll learn about each of these    systems.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/computer.howstuffworks.com\/encryption1.htm\" title=\"Security Encryption Systems - HowStuffWorks\">Security Encryption Systems - HowStuffWorks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Computer encryption is based on the science of cryptography, which has been used as long as humans have wanted to keep information secret. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30527","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30527"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30527"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30527\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}