Multiple encryption: Difference between revisions

Content deleted Content added
m fixed lint errors – misnested tags
No edit summary
Line 42:
== Examples ==
The figure shows from inside to outside the process of how the encrypted capsule is formed in the context of Echo Protocol, used by the Software Application GoldBug Messenger.<ref>{{cite web |url=http://goldbug.sf.net |title = GoldBug - Secure E-Mail-Client & Instant Messenger}}</ref> GoldBug has implemented a hybrid system for authenticity and confidentiality.<ref name=":0">Adams, David / Maier, Ann-Kathrin (2016): BIG SEVEN Study, open source crypto-messengers to be compared - or: Comprehensive Confidentiality Review & Audit of GoldBug, Encrypting E-Mail-Client & Secure Instant Messenger, Descriptions, tests and analysis reviews of 20 functions of the application GoldBug based on the essential fields and methods of evaluation of the 8 major international audit manuals for IT security investigations including 38 figures and 87 tables., URL: <nowiki>https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf</nowiki> - English / German Language, Version 1.1, 305 pages, June 2016 (ISBN: DNB 110368003X - 2016B14779)</ref>
 
 
 
'''<u>First layer of the encryption:</u>'''
Line 51 ⟶ 49:
 
'''<u>Second layer of encryption:</u>'''
Optionally it is still possible, therefore to encrypt the capsule of the first layer in addition with an [[w:Advanced Encryption Standard|AES-256]], - comparable to a commonly shared, 32-character long symmetric password. Hybrid Encryption is then added to multiple encryption.{{Citation needed|date=September 2022}}
 
'''<u>Third layer of the encryption:</u>'''