[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
yahoo encryption article
- To: Cpunks List <[email protected]>
- Subject: yahoo encryption article
- From: [email protected] (jim bell)
- Date: Tue, 8 Dec 2015 19:57:48 +0000 (UTC)
- References: <1797148754.17469530.1449604668953.JavaMail.yahoo.ref@mail.yahoo.com>
https://www.yahoo.com/tech/faq-how-encryption-works-and-why-people-are-so-184846489.html
Encryption has been all over the headlines after recent terrorist attacks, and the discussion can quickly get cryptic. Is â??cryptoâ?? a fatal weakness of the Internet? An endangered species that must be saved? You can hear heartfelt testimony for either view from both Democratic and Republican politicians.
But ultimately, encryption is just math that, like any other tool, can be used for good or ill. Letâ??s start with some basics about it that often get neglected in all the commentary.
Q. It was my understanding there would be no math in this storyâ?¦?
A. Sorry, itâ??s unavoidable: Encryption works by encoding information in such a way that its recipient can decode it (without further help from its sender), but no one else can. To do that scrambling, you need to run the original data through one equation or another.
For example, to encrypt something against the prying eyes of somebody whoâ??s really, really drunk, you could just replace each letter with one 13 places forward (so â??Aâ?? becomes â??Nâ?? and so on). If your eavesdropper is more capable, youâ??ll need something more complicated â?? but itâ??s still all equations.
Q. Okay. What makes for strong cryptography?
A. Using more complex math in an encryption algorithm only goes so far if the sender and recipient use the same key â?? that is, if they both plug the same secret set of digits into the encryption formula â?? to encrypt and decrypt. In that case, if either party loses the key, game over.