What is encryption and decrypting?
encryption and decryption relate to the transfer of electronic information or data based on the password to what is called a dialext or form that is very difficult to read, and return the same data back to the original form, which could be a simple text. Ciphertext is what data results "pass" or processed by ciphers that could easily replace the letters of the alphabet with numbers or completely manipulate data arrangement through algorithms. Sometimes re -ordered data are called Codetext, but the "code" is a simple representation of signals, whether this representation is secret or not. Morse code is one of the examples that can be called code but not dial. The data converting process back to its original form is achieved using a key commonly known as a password, but highly sophisticated software can also be used to discover the key or analyze data to return to its original form, whether it was a simple text or sound.
There are many reasons for using encryption and decryption, such as ensuring sensitive data that is transmitted to complete electronic transactions such as online purchases of goods or services and for interaction with government agencies requiring private information. When the consumer buys a product or service from a company that carries out an electronic store, simply known as an electronic store, enters its billing addresses and credit card details to the online form to be sent to be processed. Encryption and decryption should always be in such situations to protect the buyer's financial information.
Safe transmission of financial information is so important that most web browsers show whether the connection is secured by displaying an open padlock for uncertain transfers and closed for drug seivers. The address bar's background color could also change and in any case consumers should never submit data thatIf it was captured, it could lead to theft of identity or financial ruins. Letters "https" should appear in the address bar, although there is no other indication that the data is secure.
wireless data transmissions are particularly prone to capturing and reading unauthorized individuals, but communication of sensitive data within the cable networks is also quite uncertain. Legitimate companies involved in electronic trading and government offices are not the only users of encryption and decryption. Officials of some governments who have strong interest in internal security, such as the United States, believe that terrorist groups could use encryption and decryption for secret international communication.