Network Synergy Blog

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at 203.261.2201.

Mobile Computing Works to Boost Productivity
Managing Your Software Requires Three Actions
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Google Calendar Managed Services Provider Statistics Deep Learning Data Data Breach Email CrashOverride Hardware Hackers Encryption Laptop Hosted Solutions Mobile Device Management Administration User Error Social Personal Information Tech Support Google Maps Operations Wi-Fi Remote Support Tip of the Week Development Vendor Management Website Sync Legislation Windows 10 Humor Content Filtering Alt Codes Gmail Server Online Currency Proactive IT Help Desk Supercomputer Business Management Bitcoin Health Smartphone Emoji Proactive Service-based Business App High-Speed Internet Print Server Food Cables PowerPoint Applications Employee-Employer Relationship Point of Sale Processors Computer Repair IT Support Virtual Desktop Piracy Automation Managed IT services iPhone PDF Cleaning Finance Business Computing Permissions IT Solutions YouTube Electronic Health Records Fraud Redundancy Features Marketing Network Congestion Web Server Windows Software Tips BYOD Private Cloud Battery Access Control SharePoint Chatbots History Enterprise Resource Planning Hacking Search Hard Disk Drive Regulations Managed IT Service Managing Stress Productivity VoIP BDR WiFi Upgrade Samsung Wires Webinar Best Practice Identities Heating/Cooling Project Management IT Consulting Physical Security Law Firm IT Machine Learning Virtual Reality Conferencing IT Support Best Practices People Managed Service Provider Motion sickness Robot Video Surveillance Small Business Browser Government Windows 10 Mobile Security Mobile Devices Assessment Smart Technology Disaster Recovery Troubleshooting communications Display Instant Messaging Chromebook Mirgation Avoiding Downtime Augmented Reality VPN Google Mobile Device Motherboard Computer Accessories Uninterrupted Power Supply Vulnerability Fun Read Only Mail Merge Holiday Twitter Knowledge Business Technology Remote Monitoring and Management Halloween Techology Remote Workers Security Identity Theft Language Technology Laws Tech Term Migration Wearable Technology Cyber Monday Competition Skype Logs Business Intelligence Fax Server Ransomware Gadgets Bring Your Own Device Asset Tracking LiFi Excel User Tips Scam Electronic Medical Records Mobile Enterprise Content Management Information Technology Users Firefox Backups Computing Infrastructure Public Speaking Customer Relationship Management GPS Memory Cortana Vulnerabilities Remote Monitoring IT Consultant Websites Tip of the Work Work Station Blockchain eWaste Office Smartphones Streaming Media Corporate Profile Crowdfunding Printing SaaS Phone System E-Commerce Technology Leadership Document Management Computers Communication Hard Drives Unified Communications Licensing Files MSP Productivity Alert Microsoft Office Word IT budget Value Cloud Computing End of Support Google Docs Computing Shortcut Tutorials Operating System Windows 8 Two-factor Authentication Network Security Internet Exlporer Data Security Co-managed IT Time Management Administrator Computer Router Congratulations Analyitcs Cyberattacks Hotspot Presentation Storage Google Wallet Politics Geography Writing Taxes Wireless Technology Data Warehousing OneNote Maintenance Social Engineering Upgrades File Sharing Virtual Private Network Spam Mobile Data Outlook IT service Office 365 Consultation Legal Social Networking Start Menu IP Address Efficiency Mobile Computing eBay Connectivity Artificial Intelligence Identity Patch Management Buisness Cloud Touchscreen Information PC Care IoT Healthcare Windows 8.1 Update Drones Computer Care Utility Computing Net Neutrality Current Events Monitoring Sports Smart Tech Wireless Downtime Running Cable Paperless Office Server Management Managed IT Services Big Data Meetings Privacy Bookmarks Webcam Outsourced IT Hiring/Firing Phishing Cabling Text Messaging IT Management Black Market Documents Malware Lithium-ion Battery Distributed Denial of Service Disaster Data Loss Hard Drive Notifications CCTV Environment Managed Service Cryptocurrency Social Media Microsoft Excel USB Regulation Gaming Console Multi-Factor Security Infrastructure Cybersecurity Employer-Employee Relationship Mobility Unified Threat Management Budget Undo Staffing Printers Tracking Alerts Retail Inbound Marketing Cooperation Managed IT Settings Education Scheduling Disaster Resistance Network Public Cloud Consumers Virus Data Management Save Money Telephony Technology Tips 3D Printing Botnet Flexibility Company Culture Unsupported Software Virtualization Recycling Intranet Remote Computing Programming Refrigeration Law Enforcement Recovery Secruity Lenovo Internet of Things Star Wars Relocation IT Technicians Scary Stories Macro Tip of the week Staff Automobile Network Management Address IBM 3D Business Growth Firewall Crowdsourcing IT Services Internet HIPAA Monitors Save Time Software as a Service Digital Hacker Error How To Entrepreneur Compliance Break Fix Modem Office Tips Bandwidth Password Backup Hosted Solution How To Trainging Fleet Tracking Data Recovery Facebook 5G Training Apps Consulting Money Going Green Apple Software Antivirus Specifications Downloads Saving Time Workplace Tips Superfish Cost Management Data storage Trending Hacks Android Management Bluetooth Application Spyware Solid State Drive Chrome Telephone Systems G Suite User Miscellaneous Cameras Screen Reader Experience Saving Money Business CIO Digital Payment LinkedIn Dark Web The Internet of Things Comparison Travel Innovation Best Available Cache Safety Debate Risk Management Tablet Work/Life Balance Networking Mobile Technology Unified Threat Management Typing Thank You Microsoft Domains Google Analytics Charger Google Drive Cybercrime Cookies Favorites Servers WPA3 Data Backup Collaboration Mobile Office Black Friday Quick Tips Business Continuity Printer Gadget Nanotechnology Digital Signature Mouse Passwords Customer Service Business Owner

      Latest Blogs

      Once thought to just be a cool feature of the Internet--or the entirety of the Internet to your Great Aunt Maddie--instant messaging has a long history on the web. In fact, one cou...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube