Information Protection On The Internet.
Privacy problem: would you like to inform number of your credit card if knew, that this information can get into strange hands? An integrity problem: how can you advance, whether the hacker changed information sent to you? An authenticity problem: can you be assured that the company receiving your information has a good reputation? A problem of failure of obligations: how can you prove, that the message has been really sent? These questions formulate four basic requests of successful, safe transaction. In this article we will discuss, as these requests can be considered by means of such popular mechanism of protection of electronic commerce, as enciphering with an open key.
Each person, using the Network for electronic trade should understand importance of a problem of safety of the personal information. There are some protocols, which ensure data protection at transaction fulfillment. It is a question of protocols Secure Sockets Layer (SSL — level of the protected nests, the protocol of safe connections) and SET — the protocol of the protected electronic transactions.
Channels, on which the data is transmitted to the Internet, are not protected. Hence, any private information, which is transmitted on these channels, should be transmitted with use of any protection frames. To guarantee the information protection, it is possible to cipher the data. This problem is decided by cryptography with which help the data is transformed with use of a key of enciphering. The ciphered data becomes inaccessible to all except for recipients of this information. The plain data is called as clear text; encrypted data is called as the ciphered text. Only recipients of the data should have the corresponding key allowing them to transfer a text in code in a clear text.
In the past, the organization, wishing to work in the safe computing environment, used the symmetric cryptographic algorithms also known under a name of enciphering with the closed key in which the same closed key was used both for enciphering and for decoding of messages. In this case the sender ciphered the message, using the closed key, then sent a coded message together with the closed key to the recipient. Such system had defects. First, privacy and integrity of the message could be compromised, if the key was intercepted, as it was transmitted from the sender to the recipient together with the message by not protected channels. Besides, as both participants of transaction use the same key for enciphering and message decoding, you cannot advance, what side has created the message. In summary it is necessary to tell that for each recipient of messages is required the separate key, and it means that the organizations should have huge number of the closed keys to support data exchange with all correspondents.
For electronic trade is required the high scope of protection. Enciphering with an open key – asymmetric enciphering – is more safe method. In this method are used two connected keys: an open key and the closed key. The owner saves the closed key in a secret and the open key extends freely. If the open key is used for message enciphering only the closed key corresponding to it can decipher this message. And on the contrary. Each side of transaction has both opened, and the closed key. To transmit the message with higher reliability, the sender at message enciphering uses an open key of the recipient. The recipient deciphers the message, using the unique closed key of the recipient. As nobody knows the closed key the message cannot be read by anybody other, except as the recipient of the message. Thus, privacy of the message is guaranteed.
In case you are looking for online business opportunities – go to this web site. This is the place where you can see different online business opportunities and choose the ones that fit you better.
And a final piece of advice – today the web technologies give you a truly unique chance to choose exactly what you require for the best price on the market. Funny, but most of the people don’t use this opportunity. In real practice it means that you must use all the tools of today to get the info that you need.
Search Google and other search engines. Visit social networks and check the accounts that are relevant to your topic. Go to the niche forums and join the discussion. All this will help you to create a true vision of this market. Thus, giving you a real chance to make a wise and nicely balanced decision.
P.S. And also sign up to the RSS feed on this blog, because we will do the best to keep updating this blog with new publications about this “earn money online business opportunity” industry.
