Question:
What are the encryption techniques?
ajith4687
2009-11-12 07:50:07 UTC
Explain the encryption in todays mobile communication with any example?
Thanks
Four answers:
?
2009-11-12 08:21:03 UTC
Many of us are using wireless access now for everything from PCs to laptop to cell phones. But even if you live in a small town, it's a good idea to encrypt your data. Even if your network doesn't carry important information, it's not a good idea to let others use your connection. No telling what they could be up to.



Encryption, or scrambling, keeps others from accessing your network. They can't connect or see your data. Most wireless routers and adapters can handle both WEP (wired equivalent privacy) and WPA (wifi protected access) encryption schemes that you can enable.



WEP was the original. It came about in 1997 and basically passes a key back and forth between devices. Without the proper key, it drops the connection. Like this:



Hi 1234 Bob. 1234 How's 1234 it 1234 going? 1234



If the other device doesn't see the 1234, it knows you're not authorized. However, there's a drawback. If someone keeps hitting your network, eventually they'll see the key and can use it. That makes it pretty lame. It'll keep Uncle Bob off the network but someone "wardriving", or cruising the neighborhood with a laptop and a **** site to publish, will get in.



WPA (and later WPA2) came later. It gives you very good protection because the key itself is encrypted. So now it's



Hi 2&*% Bob. $()_%USKA How's @K@%RIDA it IO@YR)IUL:SAF going? (@#U$JS



Of course it's really much more involved than that. Hopefully, however, you get the idea.



Look at your router manual to see how to enable encryption (usually Wireless Security on your setup menu). It's just a matter of entering the key. Make it tough. A key of eEwVp633fbp3FELLw is much better than MaryJeffSkippy. After you set this on the router, just enter the same key on each of your devices.



If your router won't handle WPA, by all means use WEP. It's certainly better than nothing.
anonymous
2009-11-12 08:11:11 UTC
Ters are two type of encryption techniques secret key and public key encryption.

Methods of Encrypting Data

Traditionally, several methods can be used to encrypt data streams, all of which can easily be implemented through software, but not so easily decrypted when either the original or its encrypted data stream are unavailable. (When both source and encrypted data are available, code-breaking becomes much simpler, though it is not necessarily easy). The best encryption methods have little effect on system performance, and may contain other benefits (such as data compression) built in. The well-known 'PKZIPĀ®' utility offers both compression AND data encryption in this manner. Also DBMS packages have often included some kind of encryption scheme so that a standard 'file copy' cannot be used to read sensitive information that might otherwise require some kind of password to access. They also need 'high performance' methods to encode and decode the data.
?
2009-11-12 09:29:06 UTC
Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm.



There are many types of encryption and not all of it is reliable. The same computer power that yeilds strong encryption can be used to break weak encryption schemes. Initially, 64-bit encryption was thought to be quite strong, but today 128-bit encryption is the standard, and this will undoubtedly change again in the future.



mobile communication also use the same encryption technique to transfer a single msg from one mobile to another
anonymous
2014-05-24 06:33:10 UTC
There are two ways of file encryption. These methods depend upon which encryption platform you are choosing from.One is public encryption and the other is secret encryption. Other forms that are strong, reliable and provide military grade protection are AES Encryption and 256 Bit Encryption.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...