Get Started Today!  321-259-5500

croom new

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at 321-259-5500.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, June 19 2018
If you'd like to register, please fill in the username, password and name fields.

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Best Practices Technology Cloud Privacy Malware Hackers Business Computing Business Email Hosted Solutions Productivity Internet Backup IT Services Mobile Devices Network Security Computer Microsoft Software Managed Service Provider Windows 10 Ransomware Smartphone Hardware User Tips Android Google Business Continuity Data Workplace Tips IT Support Data Management Disaster Recovery Innovation Efficiency Server App Small Business Social Media Communication Tech Term Encryption Browser Managed IT Services Smartphones Data Recovery Cloud Computing Network Business Management BYOD Facebook Gmail Windows Artificial Intelligence Big Data Internet of Things Office 365 Phishing Hosted Solution Employer-Employee Relationship Office Paperless Office Apps WiFi Office Tips Robot Passwords Wireless Technology Firewall Outsourced IT Vendor Management Productivity Alert Miscellaneous Save Money Remote Monitoring Mobile Device Management Spam Recovery Data Backup Government Risk Management Upgrade Word Budget Virtualization How To IT solutions Hacker Cybersecurity Saving Money Vulnerability Infrastructure Holiday Tip of the week Avoiding Downtime Money Wireless Content Filtering Wi-Fi Two-factor Authentication Work/Life Balance Microsoft Office Password Chrome Apple Going Green VoIP Website Twitter Bandwidth IT service Document Management Computing Hard Drives Education Windows 10 Automation Settings The Internet of Things Cybercrime Virtual Reality Data storage SaaS Analytics Unified Threat Management Customer Service IT Support VPN IT Management Legal Social Applications Managed IT Services Remote Computing Tech Support Antivirus Presentation Maintenance Regulations Telephone Systems Augmented Reality End of Support Virtual Desktop Politics Health Scam Network Management Business Owner Upgrades Printing Websites Patch Management Competition Solid State Drive Data loss User Botnet User Error Best Practice Search eWaste Google Drive Collaboration Monitors Data Security Machine Learning Identity Theft Heating/Cooling Virtual Private Network Administration File Sharing Samsung Safety Taxes IBM Downtime Cortana Cost Management Outlook communications Customer Relationship Management Router Lithium-ion battery Server Management Mobile Device Hacking YouTube Unified Communications Business Intelligence Automobile Physical Security Tablet Mouse HIPAA Computers Storage LiFi Running Cable Computer Care Sports BDR Business Technology Compliance Training Mobile Security Point of Sale Lenovo IT Technicians Downloads Deep Learning VoIP Break Fix Analyitcs Staffing Current Events Buisness Screen Reader Gadget Company Culture Hotspot Computer Repair Co-managed IT Web Server Superfish Mirgation Black Market Corporate Profile Multi-Factor Security Time Management Dark Web GPS Marketing Trending Smart Tech Managing Stress Application Shortcut Language Fun Identities Cameras Bring Your Own Device Chatbots WannaCry Google Calendar Network Congestion Net Neutrality Tracking CIO Connectivity Enterprise Content Management Computing Infrastructure Entrepreneur Electronic Medical Records Operating System Administrator CCTV Business Growth Mobile Computing Networking Identity Processors Legislation Display Touchscreen FCC 3D Printing IP Address IoT Alerts Managed IT Cabling Alt Codes Public Speaking Digital Comparison Title II Unsupported Software Information Technology Mobile Office Star Wars Refrigeration Licensing Environment Google Docs G Suite Typing Techology Social Networking Spyware Specifications Relocation Online Mobile Data Supercomputer Google Wallet Assessment Hiring/Firing Mail Merge Cooperation Disaster Travel Writing Cryptocurrency Laptop Unified Threat Management Motherboard Notifications Black Friday iPhone Private Cloud Servers Microsoft Excel IT Budget Drones Internet Exlporer Address Staff Uninterrupted Power Supply Troubleshooting Motion Sickness Retail IT Consultant Gadgets Bitcoin Halloween Printer Crowdsourcing How To Cyber Monday Error Blockchain Digital Payment Hard Drive Wearable Technology Update Hard Disk Drive Humor Social Engineering Cleaning Users Windows 8 Scary Stories Access Control Modem Firefox Smart Technology Law Statistics Permissions Cache Knowledge Undo Chromebook Meetings Hacks SharePoint Cookies Distributed Denial of Service Recycling Bluetooth Fraud Save Time 5G Experience Emoji Dark Data Webcam Quick Tips Managed IT Service Nanotechnology Law Enforcement Management Personal Information Google Maps Backups USB Domains Help Desk CrashOverride Flexibility Emergency

      Latest Blog Entry

      Communication is one of the most important parts of running an organization, and this is especially true for smaller organizations that need to work closely in order to make progress. Today’s collaborative workplace is dependent on people understanding a unified message and ...

      Account Login