Changes

no edit summary
Line 346: Line 346:     
==Encryption==
 
==Encryption==
[[File:Schermata 2020-10-31 alle 17.48.05.png|alt=|miniatura|500x500px|'''Figura 4:''' Layout di criptaggio della pagina web  [https://encode-decode.com/aes-128-cfb1-encrypt-online/ Encode-Decode] ]]
+
Let us continue with the example:
Time for an example.
+
 
 +
Let us take a common encryption and decryption platform. In the following example we will report the results of an Italian platform but we can choose any platform because the results conceptually do not change:
 +
 
 +
 
 +
you type your message in plain text, the machine converts it into something unreadable, but anyone knowing the "code" will be able to understand it.  
 +
 
 +
 
 +
Let us suppose, then, that the same happens when the brain sends a message in its own machine language, made up of wave trains, packets of ionic fields and so on; and that carries a message with it to decrypt the ‘Ephaptic’ code.
   −
Find a simple encryption and decryption platform, such as [https://encode-decode.com/aes-128-cfb1-encrypt-online/ Encode-Decode] and simulate an encryption and decryption process: you type your message in plain text, the machine converts it into something unreadable, but anyone knowing the "code" will be able to understand it. Let's suppose, then, that the same happens when the brain sends a message in its own machine language, made up of wave trains, packets of ionic fields and so on; and that carries a message with it to decrypt the ‘Ephaptic’ code.
      
This message from the Central Nervous System must first be transduced into verbal language, to allow the patient to give meaning to the linguistic expression and the doctor to interpret the verbal message. In this way, however, the machine message is polluted by the linguistic expression: both by the patient, who is unable to convert the encrypted message with the exact meaning (epistemic vagueness), and by the doctor, because he/she is conditioned by the specific context of his/her specialization.
 
This message from the Central Nervous System must first be transduced into verbal language, to allow the patient to give meaning to the linguistic expression and the doctor to interpret the verbal message. In this way, however, the machine message is polluted by the linguistic expression: both by the patient, who is unable to convert the encrypted message with the exact meaning (epistemic vagueness), and by the doctor, because he/she is conditioned by the specific context of his/her specialization.
Line 357: Line 363:  
Very often, the message remains encrypted at least until the system is damaged to such an extent that clinical signs and symptoms emerge so striking that, obviously, they facilitate the diagnosis.  
 
Very often, the message remains encrypted at least until the system is damaged to such an extent that clinical signs and symptoms emerge so striking that, obviously, they facilitate the diagnosis.  
   −
Understanding how the encryption works is quite simple (go to [https://encode-decode.com/aes-128-cfb1-encrypt-online/ Encode-Decode] to try it out):
+
Understanding how the encryption works is quite simple (go to decryption platform chooses and to try it out):
    
#choose an encryption key among those selected;
 
#choose an encryption key among those selected;
Line 363: Line 369:  
#get a code corresponding to the chosen key and the typed word.
 
#get a code corresponding to the chosen key and the typed word.
   −
For example, if we insert the word ‘Ephaptic’ in the [https://encode-decode.com/aes-128-cfb1-encrypt-online/ Encode-Decode] encryption system, we will have an encrypted code in the three different contexts (patient, dentist and neurologist) which correspond to the three different algorithmic keys indicated by the  program: the key (aes-128-cbc) corresponds to the patient's algorithm, the key (aes-128-cfb) to the dental context and the key (aes-128-cfb1) to the neurological context.
+
----
 +
 
 +
 
 +
For example, if we insert the word ‘Ephaptic’ in the platform encryption system, we will have an encrypted code in the three different contexts (patient, dentist and neurologist) which correspond to the three different algorithmic keys indicated by the  program: the A key corresponds to the patient's algorithm, the B key to the dental context and the C key to the neurological context.
   −
In the case of the patient, for example, writing <code>Ephaptic</code> and using the key <code>(aes-128-cbc)</code>, the "machine" will give us back a code like  
+
In the case of the patient, for example, writing <code>Ephaptic</code> and using the A key, the "machine" will give us back a code like  
      −
<math>0HLKjM2oMw/u0LB4s6AI4w== </math>
+
<math>133755457655037A
 +
  </math>
      Line 574: Line 584:     
   
 
   
<onlyinclude></onlyinclude>
+
<onlyinclude>
 +
</onlyinclude>
Editor, Editors, USER, admin, Bureaucrats, Check users, dev, editor, founder, Interface administrators, member, oversight, Suppressors, Administrators, translator
11,492

edits