Internet Security: Understanding Encoding & Decoding Data

  • Thread starter Thread starter chaoseverlasting
  • Start date Start date
  • Tags Tags
    Internet Security
AI Thread Summary
Website security systems primarily rely on cryptography to protect data transmitted over the internet. Secure Sockets Layer (SSL) is a key technology that facilitates secure communications by encrypting data. Most encryption techniques utilize asymmetrical key encryption for secure key exchanges, while protocols like IPsec employ symmetrical keys to encrypt the actual data payload. The Diffie-Hellman technique is commonly used for the secure exchange of these keys. Encryption standards are publicly available and continuously tested, with updates implemented as vulnerabilities are discovered, exemplified by the transition from MD5 to SHA-1 due to security breaches.
chaoseverlasting
Messages
1,050
Reaction score
3
This may not be the best place to ask something like this, but I want to know how website security systems work. I don't have any malicious intent. Its just that cryptography interests me. How does encoding/decoding data over the net work?
 
Technology news on Phys.org
I think you mean SSL

http://en.wikipedia.org/wiki/Secure_Sockets_Layer

Most IP encryption techniques have at their heart asymmetrical key encryption. IPsec uses symmetrical keys to encrypt the packet payload, however the key exchange uses asymmetrical encryption, via the Diffie-Hellman technique.

As for malicious intent, all encryption techniques are open standards, and can be read up on via the IETF website . They are tested continuously, and as the protocols are cracked, they are updated. A good example of this is MD5 which was broken, and SHA-1 came about.
 
Last edited:
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top