Network Synergy Blog

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at 203.261.2201.

Mobile Computing Works to Boost Productivity
Managing Your Software Requires Three Actions


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      BYOD Paperless Office Firefox Work Station Managed IT services Best Practice Development Piracy Windows 10 Hacking Emoji Google Maps Managing Stress Automation Webcam Physical Security SaaS Cabling Technology Tips IT Support Blockchain iPhone Computers Word Presentation Private Cloud Printer Saving Money Regulations Business Technology Mouse Holiday Scary Stories Save Money Smart Tech Network Congestion Best Available Data Security Project Management Cybercrime communications Mobile Device Management Secruity Access Control Digital Payment Unified Communications LinkedIn PDF Scam Value Save Time Hosted Solutions Upgrade Google Calendar Congratulations Mobile Technology Company Culture Cleaning Mobile Office eWaste Consumers Google Docs Current Events Buisness Saving Time Operating System Language Hosted Solution CrashOverride Operations Management Undo Chromebook Net Neutrality Digital IT Consulting Network Security Statistics Hiring/Firing Workplace Tips Virtual Private Network Users Website Cookies Distributed Denial of Service Marketing Taxes How To Browser Recycling Infrastructure Inbound Marketing Software as a Service Apple Computing IT budget Chatbots Remote Computing Computing Infrastructure HIPAA Heating/Cooling Tech Support Automobile Security Wi-Fi Skype Network Management Environment Excel Telephone Systems Legal Health IBM Processors Hardware Social IT Consultant IT Support Business Growth Notifications IP Address Customer Service Machine Learning Alt Codes Break Fix Modem Domains Travel Application Cloud Computing G Suite Laptop Sports Internet How To Google Drive Superfish Microsoft Internet of Things Ransomware Antivirus Fraud Migration VoIP Unified Threat Management Specifications Battery Legislation Mobile Computing PC Care Business Intelligence Files Education User Competition Router Web Server Hard Drives Augmented Reality Business Management Network Service-based Business Documents Data Backup Utility Computing Server Artificial Intelligence IT service Identities WiFi Monitors Fun 3D Printing Encryption Hacker Tracking Flexibility Managed IT Running Cable Staffing Data Recovery Computer Accessories Data Breach Lithium-ion Battery Google Wallet Dark Web Managed IT Service Disaster Resistance Connectivity Technology Social Networking Budget Mobile Security Data Loss Office Tips Software Tips Social Engineering IoT Disaster Recovery Cameras Electronic Medical Records Identity Remote Monitoring and Management Print Server Administration Knowledge Passwords Proactive IT Motherboard PowerPoint Enterprise Resource Planning Servers Mobile Data Comparison Websites Communication Backups Document Management Computer Care Trainging Debate OneNote Smart Technology Error Vulnerability Managed IT Services Leadership Windows Microsoft Office Business Computing eBay WPA3 Meetings User Tips Information Cortana Hard Disk Drive Customer Relationship Management Screen Reader Facebook Text Messaging Mobile Device Vulnerabilities Relocation Content Filtering Windows 8 Tip of the Week Gadgets Intranet 3D Storage Administrator High-Speed Internet Microsoft Excel Wireless Entrepreneur Regulation Twitter Gadget Avoiding Downtime Data storage Fleet Tracking Business Owner End of Support Employee-Employer Relationship VPN Business Star Wars App Online Currency Analyitcs Staff Unsupported Software Data Macro Alert Law Firm IT Asset Tracking Windows 8.1 Update Help Desk USB Streaming Media People Training Memory Cache Touchscreen Mobile Devices IT Services Computer Healthcare Refrigeration Cloud Bitcoin Productivity Patch Management Motion sickness Printing Password Nanotechnology Networking Retail Bluetooth Assessment Lenovo Compliance Redundancy Digital Signature Consultation Black Friday Data Management Employer-Employee Relationship Hotspot Public Cloud Server Management GPS Remote Support Co-managed IT Technology Laws Halloween Google SharePoint Display Virtualization Spam Search User Error Humor Sync Typing Hacks Crowdfunding Hard Drive Firewall CIO IT Management Google Analytics Office 365 Virtual Desktop Backup Hackers Gaming Console Chrome Charger Fax Server Wireless Technology Windows 10 Email MSP Mobility Best Practices Personal Information Politics Risk Management Safety Botnet Time Management Enterprise Content Management Identity Theft Logs Tutorials Solid State Drive Applications Internet Exlporer Remote Workers Tablet Law Enforcement Food Apps Managed Service Provider Uninterrupted Power Supply Miscellaneous Vendor Management Webinar Disaster Samsung Drones Work/Life Balance Thank You Computer Repair Privacy Cyber Monday Virus Shortcut Monitoring Crowdsourcing The Internet of Things Money Experience Writing Remote Monitoring Innovation Public Speaking Mail Merge Geography IT Technicians Gmail Wires Wearable Technology Efficiency Start Menu Cost Management Settings LiFi Phone System Permissions Tip of the week Information Technology Point of Sale Corporate Profile Tip of the Work Smartphones Recovery Downtime Spyware Social Media Cryptocurrency History Trending Downloads Black Market Robot Conferencing Unified Threat Management Virtual Reality Smartphone Techology Data Warehousing Troubleshooting Business Continuity Cooperation Collaboration Maintenance Outsourced IT Android Quick Tips Mobile Cables Small Business Outlook Mirgation Address Government Two-factor Authentication Managed Service Upgrades Supercomputer Going Green Software Deep Learning Video Surveillance Malware Scheduling Office Phishing Bandwidth IT Solutions 5G BDR Programming Telephony YouTube Tech Term Bring Your Own Device Cybersecurity Proactive Productivity Alerts Big Data File Sharing CCTV Multi-Factor Security Licensing

      Latest Blogs

      Every business has some sort of management tasks that requires foresight, and staying up on them can keep headache-inducing situations from constantly causing downtime and costing ...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube