Vg vf vaperqvoyr gb guvax gung fbzr sbezf bs rapelcgvba ner rnfvyl
oebxra. Bar cbchyne sbez bs rapelcgvat grkg, pnyyrq EBG-13 (EBG
zrnavat EBGngr) vf fb rnfvyl oernxnoyr gung crbcyr jub hfr vg serdhragyl
pynvz gung vg fubhyq bayl or hfrq sbe ceriragvba bs nppvqragny ernqvat
bs pregnva grkg. Nabgure sbez bs rapelcgvba, xabja nf QRF, jnf ng bar
gvzr zrnag gb or n frevbhf sbez bs frpher rapelcgvba ohg gurfr qnlf na
betnavmngvba yvxr gur qvfgevohgrq pbzchgvat flfgrz urnqdhnegrerq ng
qvfgevohgrq.arg pna oernx QRF rapelcgvba va yrff guna 24 ubhef
jvgu n oehgr sbepr nggnpx. Zrnajuvyr, zhpu zber
qvssvphyg sbezf bs rapelcgvba yvxr EP5 pna
gnxr nf ybat nf 10 lrnef sbe
gur fnzrqvfgevohgrq
argjbex gb penpx. |
|
It is incredible
to think that some forms of
encryption are easily broken. One
popular form of encrypting text, called ROT-13
(ROT meaning ROTate) is so easily breakable that people who use it
frequently claim that it should only be used for prevention of
accidental reading of certain text. Another form of encryption, known
as DES, was at one time meant to be a serious form of secure encryption
but these days an organization like the distributed computing system
headquartered at distributed.net can break DES encryption in less than
24 hours with a brute force attack. Meanwhile, much more difficult
forms of encryption like RC5 can take as long as 10 years for the same
distributed network to crack.
|