What is an encryption algorithm?

Encryption is a science that the text is unreadable so that it can safely and secretly pass it to the intended recipient who uses the key to decrypt the message. The encryption algorithm is a set of data encryption steps. The original text is referred to as Plaintext and after its application encryption is called ciphertext . The encryption algorithm can be referred to as cipher and is often given a name. For example, there is one encryption algorithm called Blowfish and other named AES (advanced encryption standard), for example. Examples of early encryptions that are known to rely on simple encryption algorithms. For example, Julius Caesar used a cipher that included a replacement in which he moved the letters of the alphabet so that A was represented by D, A B be represented by E and so on. Since there are 26 letters in the alphabet, you can create 25 ciphers of this kind - 26. It should be replaced and, which is not very secret. The key to this cipher can be considered a number of places.

However, it is not necessary for the encryption algorithm to use letters. It can use numbers and other symbols as alternates for letters. In the story "The Gold Bug", Edgar Allen PoE used a substitution cipher in which the encryption algorithm includes this type of substitution using symbols.

53 ##+305)) 6*; 4826) 4#.) 4#); 806*; 48+8 $) 85 ;;] 8*;:#*8+83 (88) 5*+; 46 (; 88*96*?; 2 (5*-4) 8¶8*; 4069285);) 6+8) 4 ##; 1 (#9; 48081; 8: 8#1; 48+85; 4) 485+528806*81 (#9; 48; (88; 4 (#? 34; 48) 4#; 161;: 188;#?

If anyone solved this cipher, it would be obvious that PoE did not intend to symbols in a proper way S = 1, b = 2, etc. In this way, the encryption algorithm is a bit more complicated than the algorithm of the alphabet. If you find one letter in the alphabet shift, you can easily derive them all. But with the poe algorithm, he knew that A = 5 wouldn't tell you anything about B or any other letter.

encryption algoriteWe used in modern applications such as providing credit card transactions on the Internet are much more complicated. The keys can be up to 256 bits or longer. If they are to be burst, it will only be using computers. However, if someone should get the key of ciphers, the dial could be read immediately.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?