Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.
To encrypt more than a small amount of data, symmetric encryption is used. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of ciphertext, the key that was used to encrypt the data must be used (Learn more about Asymmetric Crypto-system for a better concept).
The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated ciphertext without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of ciphertext without possessing the key.
It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks.
In computers, Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage.
Decoding is the opposite process, The conversion of an encoded format back into the original sequence of characters.
( Encoding and decoding are used in data communications, networking, and storage. The term is especially applicable to radio (wireless) communications systems. )
Booting is a bootstrapping process that starts operating systems when the user turns on a computer. A Bootstrap Loader (BSL) is a small program but hard to code.Read More
SIM (Full form: Subscriber Identity Module or Subscriber Identification Module) card technology is one of the most popular technologies. The first SIM card was developed in 1991.Read More
Each computer on a TCP/IP based network (including the internet) has a unique, numeric address called an IP (Internet Protocol) address, enabling data packages to be addressed.Read More