Encryption Short Summary

Provido

Katılımcı Üye
21 Eki 2015
477
1
ab7dxI.jpg



Encryption Short Summary


Humanity has always tried to find a way to communicate in secret. It has always been of great importance for someone else to reach the destination without reaching the information sent to third party. It is said that the first encryption came from the Egyptians. However, Caesar method is the in Romans best known encryption type. By shifting each letter in the word 3 letters to the right, the real message was revealed. In this way, the message was protected from what they would perceive as meaningless writing when they found the message. Many encryption methods have been used by many states to this day.

Nowadays, data encryption methods are famous. Whether you want to provide website security or keep company information, everyone uses encryption to secure what they have. The most common encryption types used for site security in the internet environment are MD5, Sha-256 and Sha-1. Site owners transform and store information to protect their data. In other words, when you infiltrate a site, user passwords are not kept open. All of them are stored as hash. Of course, there are sites that do not use this directly but they are outdated sites. Big companies have exaggerated this a little and started to make the types of encryption more complex and lengthy. This increased security and extended the attackers to crack the password.

Of course, with the development of technology and the attackers finding new methods, encryption types will also not be very permanent, and new types will appear but this has always been. One side defended the information it had, while the other side tried to show itself to everyone else by taking that information.

I am certain that in the quantum computer era in the future, we will see different and different types of encryption. Development of this technology and the time when the appropriate material is produced and put into mass production, the technology system that the society will use will change a lot.

Thanks for reading!
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.