Encryption: What It Is, and How It Works for You

Status
Not open for further replies.

ddpruitt

Honorable
Jun 4, 2012
226
0
10,860
There are so many inaccuracies in this article it's not even funny. Here's a few:

"hash," a long number unique to that file

Collisions can and do occur, MD5 has a low collision rate

Each time the user saves a file in progress, a temporary version of that file is created and stored in the aptly named "temp" folder

No. Else your temp folder would have a few hundred thousand files in it.

One of the most common and bothersome weaknesses occurs when an encryption method, also called a cipher or an algorithm, that's supposed to generate seemingly random strings of gibberish instead produces outputs that have a discernible pattern. If the pattern gets noticed by interlopers, it may help them crack the encrypted data.

A similar issue involves encryption algorithms that generate predictable patterns of characters in response to repetitious, predictable input.

These are both the same problem.
 

SirCrono

Distinguished
Sep 9, 2006
31
0
18,580
Meh, it's not that inaccurate, and it´s probably intended as an arcticle to people that know nothing whatsoever about encryption.

 
Status
Not open for further replies.