Speak Clear English - Enroll Today
english & technology:
Information Security:
Types of encryption
Fonte: E-VAL Tecnologia
Conceptualizing Cryptography
Cryptography is an expression that comes from the Greek. The Greek/English translations are kryptós, meaning “hidden”, and gráphein, meaning “written”: Hidden writing. Cryptography creates a barrier that prevents cybercriminals from having access to data, especially when sending messages. This is to avoid the interception of information. It is an area of cryptology, that studies and practices principles and techniques for secure communication in the presence of third parties, called “adversaries”. But generally, cryptography refers to the construction and analysis of protocols that prevent third parties, or the public, from reading private messages.
It is essential to know the concepts of encryption and decryption, because they are the basis for the action of encryption. Encryption is the process of converting clear text to cipher code. Decryption is the opposite process of recovering the original text from ciphertext.
Many aspects of information security, such as confidentiality and data integrity, are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Encryption applications include e-commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.
Encryption Types
Encryption serves to protect data, so that only the holders of the access keys can view the content or have access to the file. There are common methods for this, as we will cite below:
Symmetric key: A model in which the same key is used to encode and decode data, in this way the same key is used both by the sender and the receiver of the message.
Asymmetric key: also called “public key”. A model that works in both private and public mode. In one of them, the key is secret, in the other the model is public. The user needs to create an encryption key and forward it to the receiver so that they can access the content.
AES (Advanced Encryption Standard): One of the most secure encryption algorithm models available today. It is even used by the United States Government and as well as by various security organizations. The organization of this model is done in 128-bit blocks, but the keys can also be applied in 192 and 256 bits, making this key much more difficult to be cracked in conventional cybercriminal attacks.
DES (Data Encryption Standard): One of the first models to be created by IBM (International Business Machines Corporation) in 1977. It is a method that provides a basic protection of only about 56 bits, offering up to 72 quadrillion combinations. It can be deciphered using a technique called “brute force”. In this case, a program constantly tests all the key possibilities, in an automated way, until it arrives at the combination it needs to decrypt.
IDEA (International Data Encryption Algorithm): Created in 1991, this is a symmetric key, which uses 64-bit blocks of information and 128-bit keys. It works by making a kind of “confusion” to encrypt the text, protecting the information and preventing the realignment for its correct reading. The structure is very similar to DES.
SAFER (Secure and Faster Ecryption Routine): A model in which encryption is done in 64-bit blocks. Commonly found by the name of SAFER SK-64. Due to weaknesses encountered by experts, new, more complex options were developed, such as the SK-40 and SK-128 bits.
Why is the use of encryption important?
Encryption (the need to disguise data) is vital to keep data confidential and information secure, whether from people, companies or organizations. In other words, encryption is the need to protect data from threats related to the use of the Internet, bearing in mind that information leakage causes great losses.
Bits
Bit, which originates from the words binary digit, or “BInary digiT”, is the smallest unit of measurement of data transmission used in computing and computing. The unique values of a bit is zero or one or even true or false.
What defines the degree of security of an encryption is the amount of bits that are applied to the encryption. For example, if an encryption is 128 bits, it means that 2128 is the number of possible keys to decrypt it. This amount of bits is considered safe today.
English Vocabulary to Know about E-mail
1) Cryptology: the study of codes, secret systems of words or numbers
2) Cryptography: the use of special codes to keep information safe in computer networks
3) Decryption: to change electronic information or signals that were stored, written, or sent in the form of a secret code; A system of letters, numbers, or symbols, back into a form that you can understand and use normally
4) Cybercriminal: hackers, people who commit a crime or illegal activity that is done using the internet
5) Cipher: an algorithm for performing encryption or decryption, a series of well-defined steps that can be followed as a procedure
6) Cyberattack: an illegal attempt to harm someone’s computer system or the information on it, using the internet
7) Technique: a way of doing anything that involves planning or skill
8) Possibility: a chance that something may happen or be true
9) Automation: the use of machines and computers that can operate without needing human control.
10) Transmission: the process of broadcasting or sending out something by radio or television, on the internet, and others, or something that is broadcast or sent out.
Did I miss any acronyms or terms related to e-mail that you want to know? Comment below to request more tech-related acronyms or terms to be added to the list.
Ready for more English? Speak English clearly when you join one of my life-changing English courses.
Click on one of the following links to start speaking clearer English!
1)NEW FREE MINI-COURSE “PUNCTUATION MISTAKES TO AVOID”
2) CLEAR ENGLISH PRONUNCIATION VIDEO COURSE
3) ENGLISH VOCABULARY – AUDIO FILES & PDF – TOEFL & IELTS
4) IDIOMS IN CONVERSATION
5) JUMPSTART YOUR ENGLISH AUDIOBOOK + EBOOK
Follow us on Youtube and Instagram:
@studyenglishwithandrea – Daily English posts
@citizenshiptest – To prepare you to pass the United States Citizenship Test
Until next time, Happy Learning!
Speak Clear English - Enroll Today
Jhessika Nascimento
Director of International Partnerships
Jhessika Nascimento is the Director of International Partnerships for Study With Andrea and lives in Brasilia, Brazil.
Jhessika is a bilingual teacher of English and Portuguese, studying for a Master's Degree in Strategic Management in Information Technologies at the Universidad Internacional Iberoamericana.
Graduation in Letters - Portuguese and English.
Postgraduate in Teaching in Higher Education.
Postgraduate in Risk Management and Cybersecurity.
Postgraduate Executive MBA in Process Management BPM-CBOK.
Postgraduate in Translation and Proofreading of Texts in English.
The following is a TOEFL Reading practice test to help you prepare for the Reading section of the TOEFL test.
Instructions: Read the sample passage below and then answer the questions that follow.
TOEFL Reading Practice Passage
Gorillas are ground-dwelling, predominantly herbivorous apes that inhabit the forest of central Sub-Saharan Africa. The genus Gorilla is divided into two species: the eastern gorillas and the western gorillas (both critically endangered), and either four or five subspecies. They are the largest living primates. The DNA of gorillas is highly similar to that of humans, from 95 to 99% depending on what is included, and they are the next closest living relatives to humans after the chimpanzees and bonobos.
Gorillas' natural habitats cover tropical or subtropical forest in Sub-Saharan Africa. Although their range covers a small percentage of Sub-Saharan Africa, gorillas cover a wide range of elevations. The mountain gorilla inhabits the Albertine Rift montane cloud forests of the Virunga Volcanoes, ranging in altitude from 2,200 to 4,300 metres (7,200 to 14,100 ft). Lowland gorillas live in dense forests and lowland swamps and marshes as low as sea level, with western lowland gorillas living in Central West African countries and eastern lowland gorillas living in the Democratic Republic of the Congo near its border with Rwanda.
(#1) Gorillas move around by knuckle-walking, although they sometimes walk upright for short distances, typically while carrying food or in defensive situations. (#2) A 2018 study investigating the hand posture of 77 mountain gorillas at Bwindi Impenetrable National Park (8% of the population) found that knuckle walking was done only 60% of the time, and they also supported their weight on their fists, the backs of their hands/feet, and on their palms/soles (with the digits flexed). (#3) Studies of gorilla handedness have yielded varying results, with some arguing for no preference for either hand, and others right-hand dominance for the general population. (#4)
The eastern gorilla is more darkly colored than the western gorilla, with the mountain gorilla being the darkest of all. The mountain gorilla also has the thickest hair. The western lowland gorilla can be brown or grayish with a reddish forehead. In addition, gorillas that live in lowland forest are more slender and agile than the more bulky mountain gorillas. The eastern gorilla also has a longer face and broader chest than the western gorilla. Like humans, gorillas have individual fingerprints. Their eye color is dark brown, framed by a black ring around the iris. Gorilla facial structure is described as mandibular prognathism, that is, the mandible protrudes farther out than the maxilla. Adult males also have a prominent sagittal crest.
A gorilla's lifespan is normally between 35 and 40 years, although zoo gorillas may live for 50 years or more. Colo, a female western gorilla at the Columbus Zoo and Aquarium, was the oldest known gorilla at 60 years of age when she died on 17 January 2017.
Questions
1. According to the passage, gorillas can live in
a. a variety of altitudes.
b. several different countries in Africa.
c. thick forests.
d. lowland forests only.
2. All of the following is true about gorillas EXCEPT
a. they primarily eat smaller animals.
b. they live in a forest habitat.
c. their genetics are similar to humans.
d. their diet consists of vegetation.
3. Look at the word predominantly in paragraph 1. The word predominantly in this passage refers to
a. impulsively
b. unfortunately
c. mainly
d. lastly
4. Look at the word inhabits in paragraph 2. The word inhabits in this passage refers to
a. lives in
b. protects
c. goes
d. works
5. The author implies that
a. most gorillas prefer using their left hand over their right.
b. gorillas rarely walk on their knuckles.
c. gorillas regularly walk upright for long distances.
d. studies haven't solidly proven which hand gorillas prefer using.
6. Why does the writer mention that the eastern gorilla also has a longer face and broader chest than the western gorilla?
a. To validate the importance a broad chest in western gorillas
b. To define the meaning of "broad"
c. To highlight a physical difference between types of gorillas
d. To demonstrate that most gorillas are identical in physical build
7. Which of the following statements is true for BOTH eastern and western gorillas.
a. Both eastern and western gorrilas are brown with red foreheads.
b. Both eastern and western gorrilas have unique fingerprints.
c. Both eastern and western gorrilas have thin hair.
d. Both eastern and western gorrilas have light brown eyes.
8. In Paragraph 3, look at the four numbers (#1, #2, #3, #4) that indicate where the following sentence would be added to the passage.
Such a range of hand postures was previously thought to have been used by only orangutans.
Where would the sentence best fit?
(View all the correct answers below.)
Great job! If you're ready to take your TOEFL preparation to the next level, go to StudyWithAndrea.com/TOEFL.
Answers: 1. d 2. a 3. c 4. a 5. d 6. c 7. b 8. #3
Click on one of the following links to start speaking clearer English!
1) TOEFL MASTER CLASS
2) free mini-course "punctuation mistakes to avoid"
3) Clear English Pronunciation Video Course
4) English Vocabulary - Audio Files & PDF - TOEFL & IELTS
About Andrea
Andrea Giordano is the founder of StudyWithAndrea.com and has taught more than 1,000,000 students from 180 countries. Andrea holds a Master of Education (TESOL) from Shenandoah University, and is the former Executive Director of TESOL and ESL programs at Campbellsville University. Andrea is a proven leader in online English teaching and is driven by her passion to help you speak English clearly.