When communicating on the Internet, it is difficult to be sure that the conversation is taking place without prying eyes. Traffic can be intercepted in different ways, so it cannot be guaranteed that the transmitted information will not fall into the wrong hands. To secure your correspondence, you should use message encryption.
Instructions
Step 1
You can encrypt a message in different ways, ranging from the simplest and ending with the use of special encryption programs. A very old and proven option is encryption using a book, one of the pages of which serves as a key. The interlocutors must have the same copies.
Step 2
Let's say you need to encrypt the word "winter". Open the book page previously agreed with the interlocutor and find the letter "z" on it. Now calculate which line it is on and which line it is in. For example, this is the fifth line, in which the required letter is the twenty-seventh in a row. Hence, the code of the first letter will be 5-27. In the same way, numerical values for other letters are substituted, separated by commas. To decipher the message, your interlocutor must open his copy of the book to the desired page and, using the numeric code, find the letters.
Step 3
One of the simplest encryption methods is to rearrange the letters. This algorithm is not very stable, so it should not be used to encrypt sensitive data. Its principle is simple: write the text to be encrypted in the horizontal rows of a matrix of 10 × 10 (as many as possible) cells. Then rewrite it again, but in one line, while taking not horizontal lines, but vertical ones. Outwardly meaningless text will turn out. To read it, you must re-enter it into the matrix.
Step 4
The algorithm described above can be complicated if the horizontal rows of the matrix are numbered with an arbitrary key - for example, 3-5-8-2-7-6-10-1-9-4. Enter the vertical columns in the line in the order of their numbering in the key and send it to the addressee. To read the message, your interlocutor needs to know the key.
Step 5
Modern supercomputers are able to iterate over millions of combinations every second, so it will not be difficult for them to decipher such messages. To reliably protect your correspondence, you should use computer encryption methods. For example, use the Steganos Security Suite program. It allows you to encrypt files and correspondence, help you delete data from your computer without the possibility of their recovery.
Step 6
If you are concerned about the protection of your information, take a comprehensive approach to this issue. For example, if you are using a Windows operating system, it would be better to switch to Linux. This OS provides incomparably more reliable storage of confidential data. If you are afraid of reading your correspondence, use the Gmail mail service. Encrypt especially important information - the likelihood that it will not fall into the wrong hands, in this case, will be very high.