Encryption: What It Is, and How It Works for You

Status
Not open for further replies.

ddpruitt

Honorable
Jun 4, 2012
227
0
10,860
7
There are so many inaccuracies in this article it's not even funny. Here's a few:

"hash," a long number unique to that file
Collisions can and do occur, MD5 has a low collision rate

Each time the user saves a file in progress, a temporary version of that file is created and stored in the aptly named "temp" folder
No. Else your temp folder would have a few hundred thousand files in it.

One of the most common and bothersome weaknesses occurs when an encryption method, also called a cipher or an algorithm, that's supposed to generate seemingly random strings of gibberish instead produces outputs that have a discernible pattern. If the pattern gets noticed by interlopers, it may help them crack the encrypted data.

A similar issue involves encryption algorithms that generate predictable patterns of characters in response to repetitious, predictable input.
These are both the same problem.
 

SirCrono

Distinguished
Sep 9, 2006
31
0
18,580
0
Meh, it's not that inaccurate, and it´s probably intended as an arcticle to people that know nothing whatsoever about encryption.

 
Status
Not open for further replies.
Thread starter Similar threads Forum Replies Date
G Streaming Video & TVs 0
Marshall Honorof Streaming Video & TVs 2
G Streaming Video & TVs 0
G Streaming Video & TVs 0
G Streaming Video & TVs 0
G Streaming Video & TVs 0
G Streaming Video & TVs 3
G Streaming Video & TVs 4
G Streaming Video & TVs 8
G Streaming Video & TVs 6
G Streaming Video & TVs 12
G Streaming Video & TVs 2
G Streaming Video & TVs 3
G Streaming Video & TVs 1
G Streaming Video & TVs 0
G Streaming Video & TVs 1
G Streaming Video & TVs 3
G Streaming Video & TVs 4
G Streaming Video & TVs 4
G Streaming Video & TVs 4

ASK THE COMMUNITY