2. z
Encryption is a technique for transforming information on a
computer in such a way that it becomes unreadable. So,
even if someone is able to gain access to a computer with
personal data on it, they likely won’t be able to do anything
with the data unless they have complicated, expensive
software or the original data key.
The basic function of encryption is essentially to translate
normal text into ciphertext. Encryption can help ensure that
data doesn’t get read by the wrong people, but can also
ensure that data isn’t altered in transit, and verify the
identity of the sender.
What is Encryption?
3. Types of Encryption
Hashing :
Hashing creates a unique, fixed-length signature for a message or data set. Each “hash” is
unique to a specific message, so minor changes to that message would be easy to track. Once
data is encrypted using hashing, it cannot be reversed or deciphered. Hashing, then, though not
technically an encryption method as such, is still useful for proving data hasn’t been tampered
with.
Symmetric methods :
Symmetric encryption is also known as private-key cryptography and is called so because the
key used to encrypt and decrypt the message must remain secure, because anyone with access
to it can decrypt the data. Using this method, a sender encrypts the data with one key, sends the
data (the ciphertext) and then the receiver uses the key to decrypt the data.
Asymmetric methods :
Asymmetric encryption, or public-key cryptography, is different than the previous method because
it uses two keys for encryption or decryption (it has the potential to be more secure as such).
With this method, a public key is freely available to everyone and is used to encrypt messages,
and a different, private key is used by the recipient to decrypt messages.
4. How Encryption Works??
Encryption is an interesting piece of technology that works by scrambling data, so it is
unreadable by unintended parties. Let’s look at how it works with the email-friendly software
PGP (or GPG for you open source people).
Say I want to send you a private message, so I encrypt it using either one of these programs.
Here’s the message:
“wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmaw
q6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBi
N5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7G
mNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf
=PAb3”
Once encrypted, the message literally becomes a jumbled mess of random characters. But,
equipped with the secret passcode I text you, you can decrypt it and find the original message.
“Come on over for hot dogs and soda!”
7. Common Encryption Algorithms
Triple DES : Triple DES was designed to replace the original Data Encryption Standard (DES)
algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple
DES was the recommended standard and the most widely used symmetric algorithm in the
industry. Triple DES uses three individual keys with 56 bits each.
RSA : RSA(Rivest, Adi Shamir and Leonard Adleman ) is a public-key encryption algorithm and
the standard for encrypting data sent over the internet. It also happens to be one of the
methods used in our PGP and GPG programs.
Blowfish : Blowfish is yet another algorithm designed to replace DES. This symmetric cipher
splits messages into blocks of 64 bits and encrypts them individually.
Twofish : Computer security expert Bruce Schneier is the mastermind behind Blowfish and its
successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a
symmetric technique, only one key is needed.
AES : The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by
the U.S. Government and numerous organizations. Although it is extremely efficient in 128-bit
form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.
8. The Future of Encryption
Cyber attacks are constantly evolving, so security specialists must
stay busy in the lab concocting new schemes to keep them at bay.
Expert observers are hopeful that a new method called Honey
Encryption will deter hackers by serving up fake data for every
incorrect guess of the key code. This unique approach not only
slows attackers down, but potentially buries the correct key in a
haystack of false hopes.
There are emerging methods like quantum key distribution, which
shares keys embedded in photons over fiber optic, that might have
viability now and many years into the future as well.