Tools of encryption ke liy sabhi

 ENCRYPTION TOOLS:-

The previous chapter provided you with a lot of insight  into the most popularly used encryption algorithms. The working of each algorithms is shown, with each step at the back end being discussed. Normally only the end result after the encryption and the decryption is visible to us, and not the result at each step. But all this of no use if a person cannot implement his\her knowledge

in practical life. Learning and understanding of the encryption algorithms alone is not at all enough. You should also know how to carry out encryption and decryption at your home, office, etc. in order to prevent an intruder from accessing your secret documents. this is one of the motives behind learning about encryption.

In this chapter, I am going to discuss a few of these readily available tools which are very popular and efficient at the same time.

First encryption tools 

TRUECRYPT

Truecrypt is one of the most popular and interesting encryption tools today.

It is a software system for establishing and maintaining an 'on the -fly-encrypted' volume (data storage device). 

On- the-fly encryption means that data is automatically encrypted, or decrypted right before it is loaded or saved, without any user intervention. No data store on an encrypted volume can read (decrypted) without using the correct password or correct encrypted key. Until decrypted, a truecrypt volume appears to be nothing more than a series of random numbers. the entire file system is encrypted (i,e.., file names, folder names, content of every file and free space). truecrypt never write decrypted data to any storage devices (it only temporarily writes data being decrypted to RAM).

Before I go further I would like to discuss few terms/phrases which will be used this section.

What is a volume:-

It is a logical entity that consists of a fixed amount of physical space on one more hard disks. physically, volumes are divided into volume segments. Different segments of a volume can be stored on one or more hard disks. On the other hands, logically, volumes are divided into directions containing files or subdirectories by network supervisors and users who have the appropriate rights.

What is mouning the volume?

In computers, to mount' is to make a group of files in a file system structure accessible to a user or user  group. In some usages, it means to make a device physically accessible. for instance, in data storage, to mount is to place a data medium ( such as a tape cartridge) on a drive in a position to operate. Before recover data from a volume, you must device. 


Comments