Messaging safe on “Social Media” ? How does encryption work?

In today’s world, Internet technology plays a very important role. We have all shifted from the real world to the virtual world. Our jobs, entertainment, daily needs, education, finance, etc., now depend on the virtual world. For all these things, we need a way to interact and fulfill these requirements, and that way is the Internet. But while you are communicating with your family, friends, vendors, service providers, or visiting websites on the World Wide Web, what do you think? How secure are you? Are your messages safe when you communicate with your loved ones on social media? Is your personal information safe when you share it on the Internet? This is where the word “encryption” comes into the picture. Yes, encryption. Encryption is not a new technology. Do you remember, before the Internet, we used letters to communicate, just like the Internet today? At that time, we also used encryption, like protecting our letters inside an envelope to protect our data or personal information. We still use the same technology; only the method is different. Today, the technology is called Encryption Technology or End-to-End Encryption. So, let’s understand end-to-end encryption in detail.

End-to-End Encryption

Introduction: End-to-end encryption is the technology used to prevent information/data from being accessed while being transferred from one source to another, or from one person to another. In end-to-end encryption, only the communicating users can read the messages, not even the social media platforms. For example, while you are texting with your loved ones, only you and your loved one can read the messages; no one else can. In the world of end-to-end encryption technology, there are four main principles at work: 1. Key Generation, 2. Message Encryption, 3. Message Transmission, and 4. Message Decryption. Let’s understand these four key components of end-to-end encryption.

Key Generation

There are two types of encryptions (asymmetric and symmetric). We are discussing asymmetric encryption in this article. The first step of this encryption is key generation. Each user needs to generate a pair of keys to encrypt the message. For example, if user X wants to send “HELLO” to user Y, both users need to generate private and public keys through a responsible “Key Distribution Center.” Generally, RSA (Rivest-Shamir-Adleman), Diffie-Hellman, and Elliptic Curve Cryptography algorithms are used to generate the keys. User Y will share only the public key with user X to send the encrypted “HELLO.” However, the private key remains with user Y. For example, if the public key of user Y is “33,” let’s look at the Message Encryption process.

Message Encryption

This process involves converting plain text into ciphertext using an algorithm and an encryption key. As we see above, user X wants to send “HELLO” to user Y. Now, encryption technology converts “HELLO” (plain text) to ciphertext (mathematical form) using user Y’s public key (33). This ensures that only user Y can decrypt the message, as only user Y has the private key. Please refer to the image below.

Message Transmission

The encrypted message is transmitted over the network to user Y. Even if a hacker tries to read the message/information, they cannot read it because they do not have the private key to decrypt it. The information is encrypted by a very secure algorithm. As discussed earlier, the factorization of very long prime numbers is used in the algorithm. Hence, it is very difficult and time-consuming to generate the duplicate private key. As hackers don’t know which prime numbers are being used, they need to check all possible prime numbers. Meanwhile, the information is already delivered to its destination.

Message Decryption

Now, the last process comes into play. User Y receives the message in the form of ciphertext. User Y then decrypts the ciphertext message into plain text (HELLO) using the private key(3). See the example image.

Conclusion

End-to-End encryption ensures maximum privacy and security by limiting message reading to only the conversing users and encrypting data. Since only the receiver user owns the matching private key, users confident they are speaking with the correct individual. The core of End-to-Encryption security is the key generation process. Asymmetric encryption is frequently used, and it requires using mathematical procedures like RSA or ECC to generate the public and private keys. Because it is impossible to factor the product of two huge prime numbers, RSA is secure. Private keys should be stored safely and are frequently secured with passwords or hardware security modules (HSMs). Even when the data is encrypted, third parties may still be able to see metadata about who is talking to whom and when.

How do we See? “Colors”? What is Color Vision Deficiency?

Could you name some colors please, you would most likely list several colors such as green, red, blue, pink, yellow, and orange. But if I told you that there are only three primary colors—red, green, and blue—and that the rest of the colors are just illusions created by your mind, let’s consider an example.

If I asked you how many colors are in the image above in part A, your answer would be three: red, green, and blue. Yes, that is correct. Now, if I asked you how many colors are in the image above in part B, your answer might be seven. However, you would be wrong. In part B, there are still only three colors. The rest are illusions created by your mind. Let’s see how this works.

As Above Image for example, when red and blue overlap, we see a new color, pink. Yellow is seen when both red and green colors are overlapping. Normally, we assume that red and blue frequencies overlap to form pink. However, the frequencies are not actually overlapping. Let’s explore the reason. If there are only three primary colors, how do we see multiple colors?

Color is a sensation of light, which is composed of electromagnetic waves. These waves have different frequencies corresponding to different colors. The eye’s retina contains three types of cone cells: S-cones (sensitive to short wavelengths or blue light), M-cones (sensitive to medium wavelengths or green light), and L-cones (sensitive to long wavelengths or red light). These cones detect only red, green, and blue frequencies. when we see a red color, the red cone cells in the retina are activated and send a signal to our brain indicating red. Similarly, green, and blue colors activate their respective cones. Our retina has only these three types of cone cells. When red and blue light overlap, our eyes detect two frequencies simultaneously but cannot differentiate between them. The eyes can detect only one frequency at a time. When two frequencies enter our eyes, our nerves get confused and send mixed signals to our brain, which then perceives a new color—pink. The same process occurs with yellow, which results from the overlap of red and green frequencies.

Thus, when multiple frequencies enter our eyes, they send mixed signals to our brain, creating the perception of new colors. All other colors are illusions created by the mind; in reality, there are only three primary colors: red, green, and blue. Television manufacturers use this concept smartly. Inside the television, there is a component called a picture tube. The picture tube can display objects and colors using only the three primary colors—red, green, and blue. The rest of the colors are just overlaps or imagination. That’s why the color model is called RGB, indicating Red, Green, and Blue.

Color Vision Deficiency or Color Blindness

Color vision deficiency, or color blindness, involves difficulty distinguishing between certain colors due to issues with the cone cells in the retina. In medical science, color blindness is detected by the absence or malfunction of red, green, or blue cones. Color blindness may vary depending on which cone cells are defective or damaged. Some individuals might have all three cone cells defective, resulting in total color blindness.

How Human “EYE” Works? What is inside the Human Eye?

Introduction

Eye is a device which converts optical energy into electrical energy and sends it to the brain! The rest of the process happens in our brain! In reality the image is formed in our brain! We use the eye as an instrument, to just collect the information from the field! Its live example is when we dream, at that time our eyes are closed but we are seeing something or the other! Basically the brain is creating an image according to the old information, that is why we can see the past in dreams, not the future!

How human eyes works

Now we understand biologically here how the eye works and how the image is formed inside the eye! For this, we first have to understand the structure of the eye! The structure of the eye is basically round! Whose total diameter is 2.5 centimeters! This circular ball is fixed in our skull! And which we can round in any direction! Only a part of which is visible to us! Which we consider as the eye! But in reality there is a small part of the eye which we call Cornea! There is a lens inside the cornea and its property is that almost 100% light can pass through it! And the focal length of this lens is the same as the diameter of the eye which is 2.5 cm! And its job is to help the eye by focusing at one place! It works almost like a mobile camera! The eye with pixels in the cornea is about 576 megapixels! The job of the pixel is to convert the light sent by the lens into electrical energy and this energy is sent to the brain through the optical nerve!

Now according to the information provided, our brain starts forming the image! Now the brain has a challenge to fill the color in the image, what color is in the image or the image is black and white! Corn cells are responsible for this! Which are located in the back part of our eye! The job of the corn cell is to detect the color property of the light that has come inside the eye and tell the brain what color it is! Corn cells are able to differentiate colors from light only when our eyes are exposed to the proper amount of light. That is why we are not able to recognize colors at night or we move from darkness to light. Nature has designed our eyes in such a way that there are two spots in our eyes, yellow spot and black spot. Yellow spot is the part in which the maximum number of pixels are accumulated. And there is not a single pixel in the black spot. Nature has designed the yellow spot very smartly and mathematically. The eye is at a certain height in our body and almost everything is below this level. So when we bend our eyes to see anything, the light that is read from the object falls directly in our yellow spot. And due to the maximum number of pixels in this support, we start seeing the image clearly. You must have seen its example in your mobile too, the more megapixels the mobile has, the better the image is seen. That is why most TV manufacturers recommend installing the TV about 30 degrees below the eye level. So that the light of the image falls directly on the yellow spot and we see the image clearly. There are almost no pixels in the black spot! So when light falls on our black spot, the brain is unable to form any image due to the absence of pixels! When a person is walking with us, we cannot see that person until the light hitting him falls on our yellow spot! Until the person comes in front of us! Till now we have seen that the brain needs light to form an image but it is very important for a fixed amount of light to enter our eyes! The iris is responsible for this! The iris works like the shutter of a shop! The brain opens the shutter of the iris only to the extent that the amount of light is sufficient for the brain! So when we look towards the sun, the iris starts closing automatically and our eyes start closing! When we come inside the room from outside, we cannot see anything for a few seconds! The iris takes time to decide how much to open! It takes 3 to 5 seconds to decide here, that is why when we enter a closed room from outside, we cannot see anything for 3 to 5 seconds!

Why 1 Dollar is not equal to 1 Rupee ? When It will Possible?

Being an Indian, you too like me wish that one dollar becomes equal to one rupee because if this happens then things will become very cheap for us like iPhone of 700 rupees and many branded things which are very cheap but why does it not happen that $1 becomes equal to one rupee, so let’s see some of its main reasons.

Trade

As we know that India is not a developed country but a developing country which is on the way to development but is not developed, so we have to depend on other countries for many things.

And we trade with other countries like Chinese tea and there are many such things which we trade with other countries, now if the price of one rupee is made equal to $1, then whichever country buys from us, then the goods will become very expensive for them, like both India and Sri Lanka trade tea, for example, if the price of 1 kg tea is 100 rupees, then the other countries which buy tea will have to pay $100 to buy tea from India because $1 is .1rs. And in Sri Lanka, he can get 1 kg for just $2, so why would he buy from us? In such a situation, our business will stop.

Foreign Investment

Foreign investment is a big reason for this because many foreign companies come and invest in India because in India, the labor cost is very cheap for them, the manufacturing cost is very cheap and they also get a very big market to sell.

In such a situation, if the value of $1 becomes 1 Rs, then the labor cost for the foreign investment companies that come and invest in India will become very expensive and the maintenance cost will become very expensive because where their work used to get done in $200, now they will have to pay from $6000 to $10000, in such a situation they will not get any benefit, so they will not like to invest here because they have a loss by investing here, apart from this, there can be many reasons due to which $1 cannot be made ₹1 until we are fully developed.

Rupee !! History Of Rupee? From “Anna to Rupee”

Rupa is a Sanskrit word. Which means that the silver coin, which we make a knock-on peat. the bar-tar system was run in Indian Valley Civilization. Bar-tar system means to take another thing in exchange for anything. As if we have more rice and we also need wheat, then we can take some wheat for the second instead of some of our rice.

                       But in the year 1540, the Sher Shah launched Rupai for the first time. In which 1 rupee means 1 silver coin which was equal to 178 wheat grains But after the first World War, silver and gold prices increased, then the British government denominated the Indian rupee.

 In which now 1 rupee means 16 aana, which was equal to 64 paise. all these copper were made of nickel. But after 1961 only the rupee was made official under the INDIAN COINAGE ACT. Now 1 rupee has been equal to 100 paise, and from July 15, 2010, we changed the symbol of rupees.

Apart from India, the rupee is the currency of many countries, but there is some difference between there rupee and Indian rupee Even then, the currency of Dubai and Qatar was also Rupees, after 1959, they had converted it to Riyal.

What is CC of the Engine ? 99 % People Fail to Correct Answer.

90 out of 100 people can tell how Much CC are their bikes? But only 5 or 10% of them can tell what a CC means. Some people call it is Weight, some people say power. So let’s know today that what is CC of engine?

    If you were calculate volume in mathematics in your childhood, then you would remember what was the unit of Volume? The unit of volume is cm3, mm3, m3 means that the cube of the unit means the cubic centimeter.

Now we know that the Cubic Centimeter is the unit of Volume. Now we see that what CC is in the engine, we all know that a cylinder is inserted inside the engine, which mixes gasoline and air. There are two volumes in the cylinder, Total Volume and Swift Volume .Swift Volume is the Volume in which the Piston is travels upwards or downwards. And in Swift Volume the engine makes Actual Power. So If the CC is given in the engine 110cc, 120cc, 150cc, 250cc, etc it means the Swift Volume of that particular engine is 110 cm3, 120 cm3, 150 cm3, and 250 cm3.