{"id":6147,"date":"2022-02-28T21:59:20","date_gmt":"2022-02-28T21:59:20","guid":{"rendered":"https:\/\/webstyleclub.website\/smart-card\/?p=6147"},"modified":"2022-09-15T01:12:56","modified_gmt":"2022-09-15T01:12:56","slug":"cryptography-confidentiality","status":"publish","type":"post","link":"https:\/\/www.smartcardbasics.com\/cryptography-confidentiality\/","title":{"rendered":"Cryptography \/ Confidentiality"},"content":{"rendered":"
Confidentiality is the use of encryption to protect information from unauthorized disclosure. Plain text is turned into cipher text via an algorithm, then decrypted back into plain text using the same method.<\/p>\n
Cryptography is the method of converting data from a human readable form to a modified form, and then back to its original readable form, to make unauthorized access difficult. Cryptography is used in the following ways:<\/p>\n
The original data may be in a human-readable form, such as a text file, or it may be in a computer-readable form, such as a database, spreadsheet or graphics file. The original data is called unencrypted data or plain text.The modified data is called encrypted data or cipher text. The process of converting the unencrypted data is called encryption. The process of converting encrypted data to unencrypted data is called decryption.<\/p>\n","protected":false},"excerpt":{"rendered":"
Confidentiality is the use of encryption to protect information from unauthorized disclosure. Plain text is turned into cipher text via an algorithm, then decrypted back into plain text using the same method. Cryptography is the method of converting data from a human readable form to a modified form, and then back to its original readable […]<\/p>\n","protected":false},"author":1,"featured_media":5649,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[175],"tags":[],"yoast_head":"\n