Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at 203.261.2201.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Refrigeration Best Practices Troubleshooting Saving Money Business Technology Webcam G Suite Internet Heating/Cooling Holiday Streaming Media End of Support People Programming Notifications Downloads communications Logs Digital Signature Phone System Regulations Nanotechnology Cloud Computing Antivirus Disaster Saving Time Mobile Devices Modem Mirgation Help Desk Thank You Productivity Storage Search Migration USB Proactive IT GPS User Company Culture Data Warehousing Consultation Innovation Data storage Social Engineering Unified Threat Management Settings Black Market Hacking Social Networking Unified Communications Best Practice Twitter Specifications Computers Business Continuity Fun Microsoft Office Firefox Writing Language Techology Apple Cache IT Support Google Calendar Managed Service Provider Processors IoT Google Cybercrime Tablet Mobile Office Computer Care Fraud Point of Sale Mobile Security Gmail Chromebook Operating System Wireless Technology Fax Server Customer Service Google Wallet Tip of the week Enterprise Resource Planning Encryption Corporate Profile Mobile Device Management Android Alert Hacker Taxes Tip of the Work Scam Trending eWaste Permissions Communication Print Server Blockchain Distributed Denial of Service Black Friday Retail Display Private Cloud Microsoft Redundancy Tracking Secruity Identities Staffing Administrator Inbound Marketing Google Docs Hackers Business Computing Email Trainging IBM Health Virtual Reality Networking Text Messaging Files Physical Security Office Tips Social Sports Collaboration Facebook Alerts PowerPoint LiFi Work Station Word Connectivity Browser Chrome Drones Utility Computing Comparison Tutorials Technology Buisness Marketing Server Management Flexibility Politics Virus Humor Printing Data Recovery BDR Hosted Solutions Smartphone Virtualization Cybersecurity 3D Printing Downtime Recovery Tech Support Cryptocurrency Hard Drives Document Management Law Firm IT Technology Tips Telephony Augmented Reality Bitcoin VPN Bring Your Own Device Smart Tech Infrastructure Botnet IP Address Paperless Office Shortcut Knowledge Computer User Tips Vulnerability Cyber Monday Windows 10 File Sharing Error Malware Hacks Relocation Office 365 Online Currency Lenovo Security Cloud Data Loss Skype Bluetooth Net Neutrality Hardware Avoiding Downtime Access Control Crowdfunding Tip of the Week eBay Customer Relationship Management Enterprise Content Management User Error Software as a Service Websites Compliance Managing Stress Superfish Identity Theft Video Surveillance Disaster Recovery Managed IT services Going Green Lithium-ion Battery Entrepreneur Gadgets Identity Emoji Mobile Device Smartphones Scary Stories Save Time Presentation Safety Social Media Digital Debate Windows 8.1 Update Electronic Medical Records YouTube Value Business Firewall Webinar Quick Tips Battery Samsung Outlook Disaster Resistance Travel Ransomware Application Content Filtering Passwords Recycling Network Money Mobile Data Work/Life Balance Domains Cameras Star Wars Remote Computing Printer Cost Management SharePoint Memory Miscellaneous Consumers BYOD Assessment Alt Codes Piracy Laptop Small Business Wi-Fi Data Breach Software Tips Conferencing Outsourced IT Motherboard Network Management HIPAA Save Money Cortana SaaS How To Current Events Hard Disk Drive Service-based Business Automobile Smart Technology Computer Repair Macro Applications Mouse Personal Information Wearable Technology PDF IT Services Office CrashOverride PC Care Best Available Risk Management Managed IT Data Management IT Solutions Users Password Meetings Maintenance Employer-Employee Relationship Software Machine Learning Robot Wireless IT service Law Enforcement Privacy Tech Term Digital Payment Computing Managed IT Service Network Congestion Cooperation Budget Microsoft Excel Cabling Spam Automation Web Server Windows 10 Windows 8 Backups Legislation IT Technicians Leadership Operations LinkedIn Remote Monitoring Business Growth iPhone Upgrades Website Charger Data Touchscreen Mobile Computing Spyware Administration Information Technology Patch Management Typing Statistics Chatbots Data Backup Internet of Things Bandwidth Virtual Desktop Licensing Business Management Google Drive Congratulations Artificial Intelligence Router Gaming Console History Solid State Drive Remote Support IT Consultant Address Start Menu Big Data IT Support CCTV Intranet VoIP Network Security CIO Healthcare 3D Internet Exlporer Hard Drive Hiring/Firing Hosted Solution Crowdsourcing Google Maps Competition Managed IT Services Dark Web Environment Deep Learning Excel Virtual Private Network Mail Merge Cleaning Unsupported Software Documents Phishing Telephone Systems Workplace Tips Servers Upgrade WiFi Mobility Hotspot The Internet of Things IT Consulting Data Security Unified Threat Management Government Food Education Monitors Efficiency Gadget Time Management Halloween Technology Laws Uninterrupted Power Supply Analyitcs Server Computing Infrastructure Scheduling IT budget 5G Running Cable Training Undo Legal Google Analytics Public Speaking Windows Productivity Computer Accessories Break Fix Two-factor Authentication Public Cloud Co-managed IT Business Intelligence Management Mobile Technology Motion sickness Experience Business Owner Project Management Sync IT Management Vendor Management Cookies Supercomputer Mobile App Staff Apps Multi-Factor Security Backup Screen Reader

      Latest Blogs

      On the surface, you might think that customer relationship management (CRM) and enterprise resource planning (ERP) are the same exact thing. However, they both have very specific n...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube