HomepageCyberwarCybersecurityCyberspaceC-SpionageC-SabotageGefährdungKriminalitätComputerKommunikationmod. SystemeDer MenschBeratungBildungFachberichteInformationKryptologieEmissionVerschlüsselungForschungBegriffeRechtTechnikVerschiedenes
E - mail encodingTransmission securityEncodingVeilingWeak points
General questions on problems of the
e-mail - encoding

Preliminary note

General approach
Safety areas
Algorithm
Key
  1. The safety
  2. The safety of the key
  3. Key length
  4. Key exchange
  5. Key exchange how?
  6. Bowl exchange methods
Organisation of the key traffic
  1. The key - this one organisation-
  2. .....
  3. .....
  4. .....
  5. ....
  6. ....
...
...

....
 
 
 
 
 
deutsch english français Español русский 中國的
Basic concept of the assignment encoding
cybernetic room
Transmitters, receivers = keys more at once
Transmitters, receivers = (the same algorithm software.)
open communication channel
information encoded
Algorithm + key