What Is Full Disk Encryption?
Data encryption is a technology with a long history, which means that the plaintext is converted to ciphertext by using an encryption algorithm and an encryption key, and the decryption is to restore the ciphertext to plaintext by using a decryption algorithm and a decryption key. Its core is cryptography.
- XOR
- The advantage of the XOR algorithm is that after the number A and the number B are XORed, the result can be XORed with the number A to get B, or the XORed number B can get the data A again. This feature of XOR can be used to easily implement data encryption and decryption algorithms.
- Build Encryption Machine Encryption
- The encryption machine is actually one of the XOR numbers, and can be constructed at will according to your needs.
Data encryption symmetric encryption technology
- Symmetric encryption uses symmetric cryptographic coding technology, which is characterized by the same key used for file encryption and decryption, that is, the encryption key can also be used as the decryption key. This method is called symmetric encryption algorithm in cryptography It is simple and fast to use, the key is short, and it is difficult to decipher. In addition to the Data Encryption Standard (DES), another symmetric key encryption system is the International Data Encryption Algorithm (IDEA). It has better encryption than DES, and it has a computer function. The requirements are not so high. The IDEA encryption standard is used by the PGP (Pretty Good Privacy) system. [3]
Data encryption asymmetric encryption technology
- In 1976, American scholars Dime and Henman proposed a new key exchange protocol to solve the problem of public information transmission and key management, allowing communication parties on insecure media to exchange information and securely agree on keys. This is the "public key system". Compared to "symmetric encryption algorithm", this method is also called "asymmetric encryption algorithm". Unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: a public key and a private key. The public key and the private key are a pair. If the public key is used to encrypt the data, only the corresponding private key can be used to decrypt it; if the private key is used to encrypt the data, only the corresponding public key can be used Decrypt. Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm.