# Data Encryption

3747 words 15 pages
ENCRYPTION
Introduction
Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control.
Still, the methods of data encryption and decryption are relatively straightforward, and easily mastered. I have been doing data
Further, if you use an 'XOR mask' in combination with this ('flipping' the bits in certain positions from 1 to 0, or 0 to 1) you end up making the code breaking process even more difficult. The best combination would also use 'pseudo random' effects, the easiest of which would involve a simple sequence like Fibonacci numbers. The sequence '1,1,2,3,5,...' is easily generated by adding the previous 2 numbers in the sequence to get the next. Doing modular arithmetic on the result (i.e. Fib. sequence mod 3 to get rotation factor) and operating on multiple byte sequences (using a prime number of bytes for rotation is usually a good guideline) will make the code breaker's job even more difficult, adding the 'pseudo-random' effect that is easily reproduced by your decryption program.
In some cases, you may want to detect whether data has been tampered with, and encrypt some kind of 'checksum' into the data stream itself. This is useful not only for authorization codes but for programs themselves. A virus that infects such a 'protected' program would no doubt neglect the encryption algorithm and authorization/checksum signature. The program could then check itself each time it loads, and thus detect the presence of file corruption. Naturally, such a method would have to be kept VERY secret, as virus programmers represent the worst of the code breakers:

## Related

• ###### Determining Databases and Data Communications
1377 words | 6 pages
• ###### QNT561 Sampling and Data Collection Pla
962 words | 4 pages
• ###### Data Analysis Assignment
2401 words | 10 pages
• ###### Business Data Communication and Networks test bank
15147 words | 61 pages
• ###### 7000 Data Management
1080 words | 5 pages
• ###### Data Basing 101
1942 words | 8 pages
• ###### Data Case
2107 words | 9 pages
• ###### Demographics and Data Collection Methodology
1227 words | 5 pages
• ###### Riordan Proposal Network and Data Upgrade
4606 words | 19 pages
• ###### Sampling and Data Collection in Research Paper
1134 words | 5 pages