Photo album and gallery


Why Encrypt? When you send a piece of first class mail, you probably seal the envelope. With that action, you are moderately comfortable that your message will be delivered at the receiving end without anyone in between reading it, or if it has been intercepted your recipient can tell. If someone wanted to watch all of the surface mail traveling through a certain point, he or she would have to open each envelope, read the information, and then reseal the envelope and have the message continue on its way. Very time consuming.

Stainless Steel (Fig.1)

In the electronic world, however, everything is different. Your email message travels in the clear through numerous computers between you and its destination, and at any one of those points the message could be read and changed without your knowledge. Everyone seals the envelope when they send a first class letter. It therefore doesn't draw any attention. In the electronic world, though, it is still a minority of people who use encryption. This is unfortunate, because it draws attention to yourself. People think to themselves "I wonder what this person has to hide" when in fact the encrypter is simply exercising his or her rights to privacy. That’s why it’s imperative to get many people using encryption. Once "all of your friends are doing it" it will no longer be considered unusual to be exercising your right to privacy.


GateCiti® Studio will supply our clients with secure password via fax, SMS or by phone


Encryption prevents any non-authorized party from reading or changing data. The level of protection provided by encryption is determined by an encryption algorithm. In a brute-force attack, the strength is measured by the number of possible keys and the key size. For example, a Triple-Data Encryption Standard system (3 DES) uses 112-bit or 168-bit keys and, based on currently available processing power, is virtually immune to Email Encryptionbrute-force attacks. Business to Business VPNs (Extranets) share sensitive data with multiple organizations, so demand the highest level of security. This requires public key encryption and/or secure key exchange, both of which are designed to eliminate the risk of the key becoming known to an unauthorized party.


Decryption is the process of decoding information that has been encrypted using a cipher. Decryption requires the use of a key - without this, and depending on the length of the key, it is practically impossible to decrypt the information. There are two groups of encryption ciphers: symmetric ciphers and public key or asymmetric ciphers.