Do You Know
What a Cipher Is?

NOT ALL PAGES ARE CONVERTED TO CELL PHONE FORMAT!

Home     Sitemap

<

www.diy-computer-repair.net logo

Are You Sure You Want To Encrypt Your Data?

To encrypt or use a cipher (also spelled cypher) to make your message unreadable with out a password...

Encryption isn't complicated in theory, in practice it gets more complicated the stronger you want the cipher to be.

However with today's technology you can get by with reading the help file and following the demo that comes with most programs.

But if you want to dig deeper in to the subject you will need to do some research, here is a small primer to wet your research apatite. :)

Here is a nice test for you: ROT13 type in a word then click the "Cypher" button. What this program does is takes each character and replaces it with a character removed 13 places, such as 'a' would be 'n'.

The cypher replaces a letter with another letter or series of letters though out a document. That is if the letter is a then the program will replace it with something else in the entire document.

To arrive at the replacement of a given character you create a string of characters that is turned into an algorithm that tells the program to find the character and replace it with another letter or series of letters.

If the a was replaced with any one of the common alphabet characters then the code would be easy to crack but there are other things going on with the algorithm that makes it harder to crack:

The more bits the algorithm has to work with the more sophisticated the code can be, such as only every x (where x is a number) letter a will be replaced with y (where y is a character), on the next pass the letter a would be replaced every x, series of characters b0e%.

The more sophisticated the algorithm is, it can make one or more passes through the document changing more characters to further confuse the program that is trying to decode the document with out the key.

You need this in your IT Tool Box! Get yours today...

The 5 Steps to high quality and cheap
DIY Computer Repairs


Get It Today...

To date there isn't a point where the algorithm is too complicated to work efficiently, it has been said that a 1024K bit (1 Mega bit) algorithm would take over two months to complete on a document of 500K words (almost an average pdf file today).

But with newer processors this time to cipher with large keys will be less than it took with say a Pentium 4 of fes years ago using a 512 bit key.

Short story: When I worked for a major company there were some computers stolen. Two of the computers were executive laptops, these laptops had sensitive data about the future of the company in plans and how to accomplish them. The compromise of these plans cost the company a lot of money.

This prompted upper level management to implement levels of security from the everyday mundane job to the executive computers they would all have some type of encryption installed that would defeat a thief. One way to do this is to encrypt the complete hard drive (there are some very complex and expensive programs that will do this) and if you didn't use the correct password the first time you didn't get a second chance, in that case you had to call the Tech Support Hot Line and tech would come out with a special disk and reset the password. I had to do at least four a day for over a month before people figured out how to create and use a complex password (a complex password contains numbers, letters, and special characters) it was a rough month.

That program was a 512 bit strength cypher program, most of the computers were Pentium 4. They handled the encryption of the hard drive quite well although when you encrypted the hard drive it did take a couple of hours to complete.

Now the question comes down to do you want to actually cipher your data?

Consider this: If you cipher your data and forget the password how will you get to your data? I only know of two programs that will crack 512 bit encryption both belong to the US Gov.

You may want to consider this:

The US Gov. is currently considering that the use of this method of protecting your data may be illegal in the sense that it takes a long period of time to recover the password for data that is protected by this means. A recent criminal attack proves this point where the FBI sued Apple for the cypher key to a cell phone;  a Judge denied the FBI's request due to privacy concerns for other cell phone owners...

You can buy a program that will cipher a file, a directory, or a complete hard drive. If you have a laptop it might be a good idea to cypher any sensitive data you have to carry while traveling. By encrypting the data you have the assurance that if the laptop is stolen your data may not be compromised unless the thief has access to some very sophisticated tools.

One thing to look for when buying a cypher program is the 'peer-to-peer' certification that insures there are no back doors or hidden algorithms that can be used to either capture the password or open the cyphered data with out the use of the correct password.

But before you use the built in Windows cypher option you may want to read this!



Emergency Repair
D
isk (ERD) - Will Yours Work?

Emergency
Repair Disk


Custom made for you...



You keyboard isn't thirsty, and it doesn't need calcium. Milk and other liquids will ruin a keyaboard!


This Web
Site is a
labor of Love
!
But Love
doesn't pay
the bills!

Please chip in $5 to keep it live...

Need A Checklist?

Need A Repair Manual?


    Page copy protected against web site content infringement by Copyscape
 

You can:


Return to
previous page:



 

 

 

 


Thank you for visiting my web site, and please come back again.

This website is not intended for children under the age of 18

Author of this web site: Monte Russell


FTC Endorsement Rules
All testimonials on the DIY Computer Repair web site are from customers who were not paid to comment on any products!


The Flag of The United States of America!   Proudly Made in The U. S. A.

Copyright and Registered to www.diy-computer-repair.net, all thieves will be prosecuted to the fullest extent of international law!www.diy-computer-repair.net

From the Desert South West ~ Arizona, U. S. A.
Copyright DIY-Computer-Repair.Com 2006-2016

 

"You found this web site through:"

Active Search Results


Return to top of Encrypt

Encrypt Your Data? Don't lose your keys...





Home    About    Sitemap
Fix It Blog!

From the Desert South West ~ Arizona, USA
Copyright www.diy-computer-repair.net 2006-2015