Network Synergy Blog

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at 203.261.2201.

Mobile Computing Works to Boost Productivity
Managing Your Software Requires Three Actions
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Memory Hard Disk Drive Law Firm IT Files Ransomware IT Solutions Troubleshooting Server Webinar Sync History Network Augmented Reality Browser Virus Customer Relationship Management Avoiding Downtime Point of Sale Virtualization Computing Mobile Devices Consumers Solid State Drive Facebook Bitcoin Charger Business Growth Regulations Mail Merge Document Management Microsoft Excel Supercomputer Legislation Food Printer Spam Assessment Retail Techology Twitter Samsung Time Management Upgrade Electronic Medical Records Buisness Storage CCTV Heating/Cooling VPN 5G WiFi Apple Crowdsourcing Wearable Technology Help Desk Environment Screen Reader Taxes Hardware Development Remote Workers Printers Staffing Security Regulation Macro Smartphone CrashOverride Miscellaneous Managed IT services Virtual Private Network Laptop Content Filtering Productivity Current Events Software Tips Skype eWaste Monitoring The Internet of Things MSP Fraud USB How To Tip of the Work Password Operating System Writing Enterprise Content Management Remote Monitoring Bandwidth Business Owner Cyberattacks Conferencing Data Cloud Computing PDF Productivity Risk Management Travel Tip of the week Administrator Halloween Blockchain Server Management Domains Government Politics Hotspot Permissions Bring Your Own Device Digital IT Technicians Documents Intranet Motherboard Firewall Managed IT Service Private Cloud Health Black Friday Drones GPS Antivirus IT Support Backups Hacking Computer Repair Read Only Vendor Management Display YouTube Debate Data Recovery Hard Drives People Data Breach Service-based Business Recovery Compliance Print Server Google communications Migration Computer Care End of Support Google Analytics Cyber Monday Data Management Social Networking Work Station Saving Time Tracking Encryption Value Business Technology Mobile Device SharePoint Windows 10 Marketing Personal Information Managed IT Office Tips Going Green Customer Service Cameras IT Consultant Relocation Business Management Gmail Hacks Vulnerabilities Proactive Leadership Instant Messaging Privacy Tutorials Finance Windows 8 Apps Wireless Cost Management Proactive IT Internet Exlporer Project Management Law Enforcement Remote Monitoring and Management Cache Android Computer Managing Stress Data storage Experience Hackers Managed IT Services Managed Services Provider Disaster Monitors Superfish Physical Security Unified Threat Management Staff Settings Remote Support Windows 8.1 Update Fun Tech Term Tip of the Week CIO Crowdfunding User Error Data Warehousing Cookies Unsupported Software Web Server Training Virtual Desktop Cloud Business Computing Tech Support Hiring/Firing Company Culture Net Neutrality VoIP Maintenance Unified Communications Technology Tips Vulnerability Work/Life Balance Network Congestion Lenovo Consulting Modem Alt Codes Processors Mobile Security Trainging Social Media Automobile Business Break Fix Office Employer-Employee Relationship Chromebook Notifications Address Statistics IT service Multi-Factor Security Electronic Health Records Best Available Internet Business Intelligence Quick Tips Computing Infrastructure Fax Server Efficiency Spyware Search IT Management Flexibility Legal Corporate Profile Shortcut Holiday Management Asset Tracking Google Wallet Scam Network Management Alerts WPA3 Firefox Computers Passwords Computer Accessories Websites PowerPoint Typing Smart Technology Machine Learning Applications Outsourced IT Competition Technology Robot Scary Stories Google Maps HIPAA Webcam IT Consulting Gaming Console Managed Service Data Backup Big Data Downloads Windows Redundancy Smart Tech Trending Data Loss Gadget Mobile Office Information Technology Disaster Resistance Presentation Virtual Reality Cabling Refrigeration Undo Running Cable Error Knowledge Digital Signature Mobility Website Healthcare Unified Threat Management Software Dark Web Alert Phishing Language BYOD Star Wars Digital Payment Distributed Denial of Service Recycling Public Speaking High-Speed Internet Mobile Device Management Mouse Employee-Employer Relationship Motion sickness Specifications Save Money G Suite Users App Access Control Consultation IP Address Small Business eBay Online Currency IT budget Chrome LiFi Meetings Uninterrupted Power Supply Microsoft Telephony Paperless Office Enterprise Resource Planning Printing Best Practice Budget Safety Nanotechnology Phone System Public Cloud Data Security PC Care Logs Cleaning Cybercrime Wires Programming Communication Internet of Things Cooperation Congratulations Wireless Technology Remote Computing IoT Saving Money Smartphones Botnet Entrepreneur Video Surveillance Sports Office 365 SaaS Best Practices Lithium-ion Battery Malware Inbound Marketing Hosted Solutions LinkedIn Windows 10 Google Docs Network Security Google Drive Features Mirgation Secruity Hacker Scheduling Save Time Backup E-Commerce Google Calendar Application Artificial Intelligence Innovation Fleet Tracking Automation Outlook Microsoft Office Humor Social Engineering iPhone Networking Hosted Solution Co-managed IT Identity Money Social Bluetooth BDR Licensing Gadgets File Sharing Administration Chatbots Workplace Tips Identity Theft Excel How To Mobile Data Information Battery User Telephone Systems Text Messaging Hard Drive Streaming Media Software as a Service Servers Analyitcs Tablet Operations Cryptocurrency Cables Managed Service Provider Mobile Technology Laws Mobile Technology Bookmarks Thank You Word Disaster Recovery Business Continuity Comparison Emoji Patch Management Two-factor Authentication Piracy 3D Printing IT Services Infrastructure Cybersecurity Geography 3D IBM Black Market Identities Wi-Fi Cortana User Tips OneNote Connectivity Favorites Start Menu Utility Computing Education Mobile Computing Collaboration Touchscreen Deep Learning Downtime IT Support Router Upgrades Email

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube