Difference between revisions of "Security"

From PKC
Jump to navigation Jump to search
Line 1: Line 1:
In the context of secure data, we must constraint our definition within the realm of [[cryptographically secure]].  
In the context of secure data, we must constraint our definition within the realm of [[Cryptographically-secure]].  
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection.
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection.



Revision as of 09:50, 9 September 2021

In the context of secure data, we must constraint our definition within the realm of Cryptographically-secure. If the data can only be accessed by someone who holds a piece of secret, then, data security is protected by the possession of such secret. Since people who don't have the secret simply have no access to the data content, therefore, the degree of security is determined by the strength of the secret protection.


References


Related Pages