11. Now, can you find the key -- the sequence of logical operations used to scramble data? 12. RSA is the dominant producer of encryption software, which scrambles computer data to prevent unauthorized people from reading it. 13. Security Dynamics is the market-share leader in authentication systems and has the de-facto standard in public key cryptography, a method of scrambling data. 14. The data is then scrambled, making it unreadable unless accessed with the correct key. 15. The game sprang into being last May, when the Clinton administration loosened a Cold War-era restriction that had slightly scrambled GPS data for civilian use. 16. These programs scramble data into unreadable globs, insuring privacy. 17. These devices would bypass encryption programs that can be used to scramble data. 18. It could enable managers to plug cracks in security, keeping unauthorized people from breaking into off-limits areas to steal or scramble valuable data. 19. Experienced hackers have already found ways to pirate or scramble valuable data from banks, hospitals, and other types or orgnanizations. |