![]() Zodiac had a crystal clear motivation for his (first) killing.Īll codes, letters and killings later-on have been a further sequence of his disgraceful action. Just later on the inhibition threshold gets less and motives of killing may have become even irrelevant.Ģ. Most times, he has a strong emotional intention why he performs his first killing. To Zodiac, the first victim was the most relevant one.Įvery serial killer has his first killing and in most cases it is something special even to him. ![]() If the algorithm you want to use is not a public key algorithm you could use something like the Diffie-Hellman exchange to effectively turn it into a public key algorithm.Please allow me first two simple assumptions:ġ. SSL does this, but you could use other algorithms as well (if the client allows it, if it's a program you control you could use anything you want). So what I hope, is that you only want to keep the data a secret from "others" - for example other people on the network (LAN/WAN whatever) who could overhear the communication between your site (it's a site right?) and a user. If "the wrong hands" includes the person using the program, obviously the program should not have the key, because no matter what trickery you use the key will at some point be available to the program and thus also to the person operating the computer. This is why passwords don't "work" - they can be stolen (key loggers, fake websites, phishing emails etc). ![]() This guarantee is what makes it impossible, because it means you can't tell to key to anyone, including the program that you want to decrypt the data. ![]() Yes SSL "works", because it encrypts traffic between two computers, and that's a communication channel.Įncrypting a communication channel just means that there are 2 parties involved and they can talk to each other, but anyone else who happens to be listening only receives a garbled mess.Įncryption of data only works if the key is guaranteed not to fall into the wrong hands. Actually it's more like a fundamental theory in crypto. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |