What is encryption?
Encryption refers to algorithmic schemes that code simple text into illegible form or Cyphertext and provide privacy. The encrypted text receiver uses the "Key" message to decrypt it and returns it to the original simple text form. The key is the algorithm trigger mechanism. Today, with online marketing, banking, healthcare and other services, the average household is much more aware of.
Web browsers automatically encrypt the text when they are connected to a secure server, as evidenced by the address starting with https . The server decrypts the text upon its arrival, but as the information travels between computers, capture transmission will not be "listened" to anyone. They would only see the unreadable Gibberish.
There are many types of encryption and not all of them are reliable. The same performance of the computer as YIELDS strong encryption can be used to violate weak schemes. Initially 64 -bit encryption was considered quite strong, but today is a 128 -bit standard, and thatwill undoubtedly change in the future.
Although browsers automatically encrypt information when connected to a secure site, many people decide to use encryption in their e -mail correspondence. This can be easily done using programs that contain a plug-in or interface for popular e-mail clients. Most of them are called PGP (quite good privacy) , a modest name for a very powerful encryption program of military class. PGP lets not only encrypt e -mail messages, but also personal files and folders.
encryption can also be used for the entire volume or unit. For the use of the unit it is "mounted" using a special decryption key. In this state, the drive can be used and read a normus connection. Upon completion, the drive is dismantled and returns to an encrypted state, unreadable interclusions, Trojan horses, spyware or snoops. Some people decide to keep financial programsWe or other sensitive data on encrypted units.
encryption schemes are categorized as symmetrical or asymmetric . Symmetrical key algorithms such as Blowfish, AES and Des, work with a single pre -cut key that is shared between the sender and the receiver. This key encrypts and decrypts the text. In asymmetric encryption schemes, such as RSA and Diffie-Hellman, the "Key pair " scheme for users: a public key and a private key. The public key can be published online for the sender to use to encrypt the text that will be sent to the owner of the public key. Once encrypted, Cyphertext cannot be decrypted except for the one who holds the private key of the key. This algorithm is based on two keys working in cooperation with each other. It is considered to be one step safer than symmetrical encryption as a one -step, as the decryption key can be kept private.
strong encryption causes data to be private, but not necessarily secured . To ensure, the recipient of the data - often server - must be positively marked as approved. This is usually done online using digital signatures or certificates.
Since more people realize the open nature of the Internet, E -mail and fast messages, encryption will undoubtedly become more popular. Without it, information transmitted on the Internet is only available for virtually anyone to capture and read, but often stored for years on servers that can change their hands or be at risk in any way. For all these reasons, this is a goal that is worth watching.