## [[Cryptography]] ### [[PGP encryption method]] ## Security techniques ### [[Security by obscurity]] This method relies on the fact that it's difficult to attack something unless you know it exists. For example, when attempting to hide a webpage from users, it may be sufficient to give it a long and unwieldy hexadecimal string as a name, because it's not something people are likely to find. This method works best for non-confidential information, as it involves publishing the information and attempting to hide in plain sight. ### [[Security by difficulty]] Security by difficulty is probably the most popular method, and it relies on attackers having limited computing resources. Most modern algorithms _can_ be solved; it's just not feasible to solve them. A disadvantage of this approach is that it needs to be regularly revised as technology advances. In a way, this approach is a race between technological knowledge and mathematical knowledge, as it tends to rely on mathematics to calculate what is theoretically possible to solve before computing can actually reach that point. ### [[Certification and Authentication]] One way to establish security is to identify the two parties attempting to communicate, and then to encrypt communication between them such that others cannot intercept the message. [[SSL]] is an implementation of certification and authentication. ## Related - [[Your connection is not private]]