123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> General >> View Article

Cryptography-00-50

Profile Picture
By Author: chandrajit
Total Articles: 4393
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The word \"Cryptography\" comes from the Latin Word \"Crypto\" or \"Encrypto\" which means \'hidden\'. In brief, \"The Science of Encryption\" is known as Cryptography. This is a Technology that has been used since Man was born on this Planet. \"Crypto\" was even a part when the first man on planet had hidden something which was precious to him. The word \"Encryption\" means some data or information is Coded which needs to be decoded to get the actual meaning.
In the primitive age Men used to hide their things in Caves and Barks of trees to keep them hidden from others. As the age advanced, even Kings and Emperors used to encrypt their messages before sending it via their Messengers. An wonderful form of Encryption Device was made by Leonardo Da Vinci that is still today Unencryptable. Composed of a wooden cylindrical chamber it consisted of such an encryption chamber which made it impossible for anyone other than the man desired to open it. Either, the message inside would be destroyed or it would be delivered in safe hands.
Encryption is something that we use in our everyday life. Even the Lock and ...
... Keys, your Mobile Phone, your Remote Car Key, your E-Mail ID uses encryption techniques to protect your privacy. Your lock and Keys keep your home locked. Your Mobile Phone uses Encrypted Radio Waves for your communication so that other radio devices cannot interfere in your conversation. Your Remote Car Key uses encrypted Infrared signals to lock your Car and your E-Mail ID uses a 12-Bit or 24-Bit SSL encryption Technique to protect your mailbox. The Science today has made encryptions even firm. Digital encryptions and Digital Locks have changed the way we live. More and more encryption techniques need to be researched because as the number of Encryption techniques increase the no of Decryption techniques or Hackings also keep increasing.
Today, to make a Full Proof Encryption Device Scientists are using Biometric Scanning Methods to make Encryptions more powerful. Human Finger Prints, Foot Prints and even Human Retina Scan are considered one of the most powerful Encryption bases to deal with. Black Dots and Capsules are also one of the finest Encryption techniques being researched.
The conclusion is that, there is a world of people who are going on making better and sophisticated encryption Devices and another world which is going on Decrypting and Hacking encryption devices. Personally, I would like to say that “Where there is Encryption, there must be some way for Decryption” .hidden
I highly recommend visiting here for more info about devices

Total Views: 267Word Count: 453See All articles From Author

Add Comment

General Articles

1. Rules For Safe Driving In United States
Author: Patrica Crewe

2. Barebone Vs. Prebuilt Vs. Custom Pc: Which Is Right For You?
Author: adlerconway

3. Best Seo Company In Uk That Delivers Real Growth
Author: doaguru infosystems

4. Global Nanomedicine Market Enters A High-growth Phase Driven By Precision Drug Delivery
Author: siddhesh

5. What Is The Future Of The Pet Equipment Market? Growth Forecasts & Insights
Author: siddhesh

6. Global Dental Biomaterial Market Outlook Accelerates With Restorative And Bioactive Innovations
Author: siddhesh

7. Spiritual Tripindi Shradha Pooja And Rahu Ketu Pooja In Trimbakeshwar
Author: Pandit Ramkrishna Guruji

8. How Air Filters Contribute To Better Sleep Quality
Author: Jack Hoover

9. Where To Buy Poppers In The Uk: Your Complete Guide To Stores Vs. Online Shopping
Author: ukpopper

10. How Law Firm Seo Services Help Attract High-value Clients
Author: Attorneyrankings

11. Custom Power Apps Solutions For Automating Complex Business Processes
Author: david

12. Tractors: The New Era of Comfort To Farmers While Cultivating!
Author: khetigaadi

13. Top Non Voice Projects Provider | Zoetic Bpo Services
Author: mohan

14. Simple Guide For Pitra Dosh Puja And Kaal Sarp Dosh Puja In Trimbakeshwar
Author: Pandit Anuj Guruji

15. How Technology Adoption Challenges Affect Long-term Business Strategy
Author: david

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: