Convergent Encryption
Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ciphertext from identical plaintext files. This has applications in cloud computing to remove duplicate files from storage without the provider having access to the encryption keys. The combination of deduplication and convergent encryption was described in a backup system patent filed by Stac Electronics in 1995. This combination has been used by Farsite, Permabit, Freenet, MojoNation, GNUnet, flud, and the Tahoe Least-Authority File Store. The system gained additional visibility in 2011 when cloud storage provider Bitcasa announced they were using convergent encryption to enable de-duplication of data in their cloud storage service. Overview # The system computes a cryptographic hash of the plaintext in question. # The system then encrypts the plaintext by using the hash as a key. # Finally, the hash itself is stored, encrypted with a key chosen by the user. Known A ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Cryptosystem
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. The term ''cipher'' (sometimes ''cypher'') is often used to refer to a pair of algorithms, one for encryption and one for decryption. Therefore, the term ''cryptosystem'' is most often used when the key generation algorithm is important. For this reason, the term ''cryptosystem'' is commonly used to refer to public key techniques; however both "cipher" and "cryptosystem" are used for symmetric key techniques. Formal definition Mathematically, a cryptosystem or encryption scheme can be defined as a tuple (\mathcal,\mathcal,\mathcal,\mathcal,\mathcal) with the following properties. # \mathcal is a set called the "plaintext space". Its elements are called plaintexts. # \mathcal is a set called the ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Tahoe-LAFS
Tahoe-LAFS (Tahoe Least-Authority File Store) is a free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar to Freenet, depending on the front-end used to insert and access files in the Tahoe system. Tahoe can also be used in a RAID-like fashion using multiple disks to make a single large Redundant Array of Inexpensive Nodes (RAIN) pool of reliable data storage. The system is designed and implemented around the " principle of least authority" (POLA), described by Brian Warner (one of the project's original founders) as the idea "that any component of the system should have as little power of authority as it needs to get its job done". Strict adherence to this convention is enabled by the use of cryptographic capabilities that provide the minimum set of privileges necessary to perform a given task by asking agents. A RAIN array acts as a stora ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Salt (cryptography)
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data Data ( , ) are a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted for ..., a password or passphrase. Salting helps defend against attacks that use precomputed tables (e.g. rainbow tables), by vastly growing the size of table needed for a successful attack. It also helps protect passwords that occur multiple times in a database, as a new salt is used for each password instance. Additionally, salting does not place any burden on users. Typically, a unique salt is randomly generated for each password. The salt and the password (or its version after key stretching) are concatenated and fed to a cryptographic hash function, and the output hash value is then stored with the salt in a database. Th ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
![]() |
Copyright Infringement
Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to produce derivative works. The copyright holder is usually the work's creator, or a publisher or other business to whom copyright has been assigned. Copyright holders routinely invoke legal and technological measures to prevent and penalize copyright infringement. Copyright infringement disputes are usually resolved through direct negotiation, a notice and take down process, or litigation in Civil law (common law), civil court. Egregious or large-scale commercial infringement, especially when it involves counterfeiting, or the fraudulent imitation of a product or brand, is sometimes prosecuted via the criminal justice system. Shifting ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
![]() |
Banned Books
This is an index of lists of banned books, which contain books that have been banned, prohibited or censored by government A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ... or religious authority. By government * * * List of authors banned in Nazi Germany * List of books banned in India * List of books banned in New Zealand * List of LGBTQ books banned in Russia * List of most commonly challenged books in the United States By religious authority * List of authors and works on the ''Index Librorum Prohibitorum'' See also * Banned Books Museum * Book burning ** List of book-burning incidents * Lists of prohibited books References {{DEFAULTSORT:Banned books Blacklisting Lists of book lists Lists of controversial books Lists of prohibited books ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
![]() |
Plain-text
In computing, plain text is a loose term for data (e.g. file contents) that represent only characters of readable material but not its graphical representation nor other objects (floating-point numbers, images, etc.). It may also include a limited number of "whitespace" characters that affect simple arrangement of text, such as spaces, line breaks, or tabulation characters. Plain text is different from formatted text, where style information is included; from structured text, where structural parts of the document such as paragraphs, sections, and the like are identified; and from binary files in which some portions must be interpreted as binary objects (encoded integers, real numbers, images, etc.). The term is sometimes used quite loosely, to mean files that contain ''only'' "readable" content (or just files with nothing that the speaker does not prefer). For example, that could exclude any indication of fonts or layout (such as markup, markdown, or even tabs); characters suc ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
Cryptographic Hash
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptographic application: * the probability of a particular n-bit output result (hash value) for a random input string ("message") is 2^ (as for any good hash), so the hash value can be used as a representative of the message; * finding an input string that matches a given hash value (a ''pre-image'') is infeasible, ''assuming all input strings are equally likely.'' The ''resistance'' to such search is quantified as security strength: a cryptographic hash with n bits of hash value is expected to have a ''preimage resistance'' strength of n bits, unless the space of possible input values is significantly smaller than 2^ (a practical example can be found in ); * a ''second preimage'' resistance strength, with the same expectations, refers to a similar problem of finding a second message that m ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Cloud Storage Service
A file-hosting service, also known as cloud-storage service, online file-storage provider, or cyberlocker, is an internet hosting service specifically designed to host user files. These services allow users to upload files that can be accessed over the internet after providing a username and password or other authentication. Typically, file hosting services allow HTTP access, and in some cases, FTP access. Other related services include content-displaying hosting services (i.e. video and image), virtual storage, and remote backup solutions. Uses Personal file storage Personal file storage services are designed for private individuals to store and access their files online. Users can upload their files and share them publicly or keep them password-protected. Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as PDFs, word processor documents, and spreadsheets. However many remote file storage servi ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Data Deduplication
In computing, data deduplication is a technique for eliminating duplicate copies of repeating data. Successful implementation of the technique can improve storage utilization, which may in turn lower capital expenditure by reducing the overall amount of storage media required to meet storage capacity needs. It can also be applied to network data transfers to reduce the number of bytes that must be sent. The deduplication process requires comparison of data 'chunks' (also known as 'byte patterns') which are unique, contiguous blocks of data. These chunks are identified and stored during a process of analysis, and compared to other chunks within existing data. Whenever a match occurs, the redundant chunk is replaced with a small reference that points to the stored chunk. Given that the same byte pattern may occur dozens, hundreds, or even thousands of times (the match frequency is dependent on the chunk size), the amount of data that must be stored or transferred can be greatly reduce ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Bitcasa
Bitcasa, Inc. was an American cloud storage company founded in 2011 in St. Louis, Missouri. The company was later based in Mountain View, California until it shut down in 2017. Bitcasa provided client software for Microsoft Windows, OS X, Android and web browsers. An iOS client was pending Apple approval. Its former product, Infinite Drive, once provided centralized storage that included unlimited capacity, client-side encryption, media streaming, file versioning and backups, and multi-platform mobile access. In 2013 Bitcasa moved to a tiered storage model, offering from 1TB for $99/year up to Infinite for $999/year. In October 2014, Bitcasa announced the discontinuation of Infinite Drive; for $999/year, users would get 10TB of storage. [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
Flud
Flud was a social news reader application released in 2010 for iPad, iPhone, Android and Windows Phone. It was designed to display RSS feeds from blogs and news sites into individual streams for easy viewing. In Flud, articles and stories could be stored for later reading with the Reading List, shared as a favorite read with the Flud button, and shared with Facebook, Twitter, email, Tumblr, Instapaper, and ReadItLater. Flud was headquartered in the historic Spreckels Theater Building in San Diego, California, with remote offices in Detroit and Chicago. Flud had been tagged as "the first true social news reader" where users could create a personal profile, follow others who share their interests, and become influencers to their followers by sharing content (known as Fluding). On August 8, 2013, Flud was discontinued. History Flud started as a "secret sauce" project in the summer of 2010 between Bobby Ghoshal and Matthew Ausonio of San Diego, California. Flud 1.0 for the iPad ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |
|
![]() |
Ciphertext
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. This process prevents the loss of sensitive information via hacking. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher. Conceptual underpinnings Let m\! be the plaintext message that Alice wants to secretly transmit to Bob and let E_k\! be the encryption cipher, where _k\! is a secret key, cryptographic key. Alice must first transform the plaintext into ciphertext, c\!, in order to securely send the message to Bob, as follows: : c = E_k(m). \! In a symmetric-key system, Bob knows Alice's encryption key. ... [...More Info...] [...Related Items...] OR: [Wikipedia] [Google] [Baidu] |