Cryptography protection of information

Encryption is the technique by which you encode (and decode) a text

in such a way as to make it unintelligible to anyone who does not know the access key. At first glance you might think that only spies, criminals and secret agents might need a secret code to communicate; in fact, encryption is a valuable resource, almost indispensable to anyone wishing to protect their privacy seriously. The computer, in fact, are made ​​for easy access to information, not to hide them.

Financial documents, personal letters, photographs, access codes and other personal documents, which once could be kept in a safe or in a locked drawer, now often lie within a hard disk to which anyone could access, copying the content without leaving any trace of their intrusion. Not to mention when you want to send something to someone, the “sacredness” of the sealed envelope of the postal service has given way to the email, in which our messages before you get to your destination leave no trace of itself in dozens of unknown servers.

Who can say if someone will access to that information without our knowledge?

CryptographyThe problem is very’ve also heard from our readers, we have sent a number of letters asking how to effectively protect your data from prying eyes. The only serious way to protect themselves is to use some form of encryption, which will transform our data into a jumble of symbols unreadable to anyone who does not have the access key.

Encryption has existed since ancient times and almost all of us as children we tried some simple technique to create secret messages by replacing each letter another letter or symbol abstruse. However, there are different levels of security, and apparently to try to decipher codes, they can still prove to be an open book to a cryptography expert.

This applies in particular to the present day, as a work of deciphering that would have required years of trying can be done in just a few minutes from a fast computer. In practice, there is no code that can not be deciphered, having available a sufficient time; It is therefore considered an encoding effective than that for which it is mathematically demonstrable that this time would be too long to justify an attempt to decipher.

Encryption: to protect your data

A very serious problem that plagues many encryption systems is that the secrecy of the keys. A code can also be frighteningly difficult to decipher, but it will be totally useless if the light somehow manages to get hold of the key. The problem is particularly serious in the case of data that need to be shipped away.


If I want to send confidential messages to a person on the other side of the world, how do I send them the key to read the messages, without risking that someone else gets out and can read everything you write with impunity in the future?

This system has been solved with the so-called encryption systems “public key”. With these systems, every person possesses not one but two personal keys, a “public” and “private.”

The two keys are mathematically generated codes so as to be in relation with one another, without, however, that can be deduced from one another. The relationship between the two codes is such that it is possible to encode a message using the public key of a person and it will be decipherable only by using its private key! In this way it becomes possible to write messages that will be readable by a single person, without it being necessary any exchange of secret keys.

Encrypting data, or encodes, can guarantee an improvement in the safety of your privacy