Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Secrecy
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Computing == [[File:Das_Geheimnis_-_Le_secret.jpg|thumb|''Das Geheimnis'' (The Secret'') (Le secret)'', [[Felix Nussbaum]]]] {{See also|Full disclosure (computer security)|Kerckhoffs' principle|security through obscurity}} Preservation of secrets is one of the goals of [[information security]]. Techniques used include [[physical security]] and [[cryptography]]. The latter depends on the secrecy of [https://www.cloudflare.com/learning/ssl/what-is-a-cryptographic-key/ cryptographic keys]. Many believe that security technology can be more effective if it itself is not kept secret.<ref>{{Cite book|url=https://www.nap.edu/read/1581/chapter/4|title=Read "Computers at Risk: Safe Computing in the Information Age" at NAP.edu|year=1991|doi=10.17226/1581|isbn=978-0-309-04388-5|language=en}}</ref> [https://cs.uwaterloo.ca/~dberry/COURSES/software.engr/lectures.pdf/inf_hiding.pdf Information hiding] is a design principle in much [[software engineering]]. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.{{Citation needed|date=December 2008}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)