How does encryption work? – Gary explains

Read more: http://goo.gl/XuYC8k

You probably use some form of encryption almost every day, and you probably don’t even think about it. But what is it and how does it work?

Download the AndroidAuthority App: https://play.google.com/store/apps/details?id=com.androidauthority.app

Subscribe to our YouTube channel: http://www.youtube.com/subscription_center?add_user=androidauthority
—————————————————-
Stay connected to Android Authority:
– http://www.androidauthority.com
– http://google.com/+androidauthority
– http://facebook.com/androidauthority/
– http://twitter.com/androidauth/
– http://instagram.com/androidauthority/

Follow the Team:
Josh Vergara: https://plus.google.com/+JoshuaVergara
Joe Hindy: https://plus.google.com/+JosephHindy
Lanh Nguyen: https://plus.google.com/+LanhNguyenFilms
Jayce Broda: https://plus.google.com/+JayceBroda
Gary Sims: https://plus.google.com/+GarySims
Kris Carlon: http://plus.google.com/+KrisCarlon
Nirave Gondhia: http://plus.google.com/+NiraveG
John Velasco: http://plus.google.com/+JohnVelasco
Bailey Stein: http://plus.google.com/+BaileyStein1

source

Author: avnblogfeed

ANGELHOUSE © 2009 - 2022 | HOSTING BY PHILLYFINEST369 SERVER STATS| & THE IDIOTS ROBOT AND CONTROL INC. |(RSS FEED MODULE)| ALL YOUTUBE VIDEOS IS A REGISTERED TRADEMARK OF GOOGLE INC. THE YOUTUBE CHANNELS AND BLOG FEEDS IS MANAGED BY THERE RIGHTFUL OWNERS (AVNBLOGFEED.COM)

40 thoughts on “How does encryption work? – Gary explains

  1. I never noticed the letters on the enigma machine were different than a regular qwerty keyboard.

  2. Business Opportunity in Ruvol

    I have invented a Board Game [still unpublished and not yet out in the market] that I believe is guaranteed to be as challenging and exciting as CHESS. I called it “RUVOL.”

    It is my hope that one day Ruvol may surpass chess as the “Number One Board Game in the World.”

    The weakness of chess is it always starts in fixed positions that the opening moves become “memorizable.” In fact, not a few have so mastered the moves that they can play against their opponents “blindfolded.” It is for this very reason that the great Bobby Fischer introduced his so-called “Fischer Random Chess,” where the starting position of the pieces is “randomized” to make the memorization of openings impracticable. Fortunately, it is also for this reason that I invented Ruvol where “every game” has been calculated to be a challenging one to play.

    HOW IS RUVOL PLAYED and HOW YOU CAN MONETIZE IT?

    I detailed everything in my YouTube video. Here is the link: https://www.youtube.com/watch?v=jcqth0m3-R0

    BIG MONEY POTENTIAL IN RUVOL!

    It is worthwhile to note that the people who play chess will be the same people who will play Ruvol. In my Google search, I learned there are around 800 million chess players in the world. Even just a small percentage of these 800 million is good enough to earn big money from Ruvol either as an ONLINE GAME BUSINESS or as a PHYSICAL PRODUCT DISTRIBUTOR.

    You may contact me at: rodolfovitangcol@gmail.com.

    Thanks and God bless!

    RODOLFO MARTIN VITANGCOL

    The Ruvol Inventor

  3. Caesar encryption is REAL = SEEN + X the shift between alphabets being *X*.
    Guessing any correspondence you have "X" and then any letter.

  4. use this site to decrypt my message!
    https://www.gillmeister-software.com/online-tools/text/encrypt-decrypt-text.aspx

    ɓuızɐɯɐ ɹn sıɥʇ pɐǝɹ uɐɔ n ɟı puɐ ɔqɐ sı uoıʇdʎɹɔǝp ɹoɟ pɹoʍssɐd

    ivrH9w9/T8wSSEIF4dd3QdDlWXb3dcZGWCB25Sxa+iRiBsr2Yr6DXI87YKihLoVRiS1lby8TPIncA1UB8dC6iFxWsJrpPiivNqlEB+y49AmcpFOc7Hmm5jER2aAHeIbo/g9DyZwH4bIsu/IR1rAYxjgnAmPZeUEHln21epB4Trfvpo0QMkJKkRv8eYnUEUQi798AHBwmVsGOrq1CfsBO01wju1UYiwiL64r51rjTaCsLLQD2tyH/Gr/PULLkxylX

  5. I needed to change my encryption code. I seemed to activated my sims lock with a new code. Did I re-encrypt my phone? Against the person(hacker) who has my original encrytion code? Am I safe now? Which is more powerful sims lock or the encryption code feature on android?

  6. I was wondering how the computer that's decrypting knows the key? If it is just sent via the internet wouldn't that be subject the same kind of attack that encryption was designed to protect against in the first place? I mean there still needs to be a way to send the key to the computer doing the decrypting so why couldn't any computer just grab that key and do the pseudo-randomization from the beginning ending up with the decrypted file.

  7. Sorry if im asking a dumb question but how do you send the key without a man in the middle finding the key and then applying it to the encrypted data stream?

Comments are closed.