

Written by Scott Craver, Associate Professor of Electrical and Computer Engineering, Binghamton University, State University of New York. It’s important to study the inner workings of locks and computer programs to understand how their design might allow someone to break them.

Most drugs work because by binding to the target receptor site, they can either block the physiological function of the protein, or mimics its effect.

#LOCK AND KEY CONCEPT PASSWORD#
Second, it’s important to engineer a lock or computer program that requires every bit of the key or password to be exactly correct. This is often referred to as a lock and key model. What does this teach us about security? First, we must make keys secret by making a very large number of possible keys, so that the right one is hard to guess or build. However, it takes a great deal of skill and practice to do this. By sliding a thin piece of metal into the cylinder and gently pushing the pins to the correct height one by one, locks can be opened. It is also possible to unlock or “pick” locks without a key. That would be like posting a picture of a credit card or a password – someone could use the photo to duplicate the key. But as you can see, a key is also very much like a password, except it is encoded by grinding a piece of metal.įor this reason, you shouldn’t ever post a picture of your house key on the internet. A fingerprint would be an example of something you are. A key is an example of something you have. In computer security, we say that security relies on “something you know, something you have or something you are.” A password is an example of something you know. A locksmith can also change a lock by removing its pins and fitting it with new ones to match a chosen key. Keys are made by placing a blank key into a grinding machine that is programmed to carve out the exact valleys that are needed. For a cylinder to turn and a lock to open, all the pins must be aligned.
