All you need to know about Encryption

11:19 AM
All you need to know about Encryption
-

News broadcasts, television series, and even science fiction shows often discuss encryption. With all this hype, you might be a little intimidated by the idea. Encryption is not a difficult concept to grasp, and it can play a vital role in protecting your information while you're online.

Encryption Basics

Encryption takes real information and turns it into nonsense. The only way to get the real information of the symbols clutter that result is to use an encryption algorithm, which reveals that this model was used to adopt the coding first.

Sometimes the figure is incredibly simple. For example, in the sentence "I like apples," you can replace each letter with a number. Number 1 is A, B is 2, and so on. In the end the sentence becomes "9 1291115 1161612519. "

most computer encryption is much more sophisticated the figure could be a complex alphanumeric algorithm that takes a genius. - or a team of geniuses - unravel if they do not have the figures on hand

encryption types

Well. it would take an infinite time to delve into all the intricate details of the various encryption methods and their nuances, there are three types of encryption base that are easy to understand.

symmetric encryption

This is the basic type most encryption, and many online services use to protect the information of their customers. with symmetric encryption, data is scrambled at one end of a communication. To decrypt data, the person or the computer that receives the communication uses the same key used to scramble first. Symmetric encryption is generally safe if the figure is protected against piracy.

Asymmetric encryption

With asymmetric encryption, a party uses a widely known and published key to encrypt the information. However, the recipient can not decrypt the data unless the recipient has a different private key.

The main disadvantage of this type of encryption is that to use it you must be able to trust the public key of the source. Asymmetric encryption is vulnerable to many in the middle cyberattacks.

Hashing

With hashing, encryption creates a hash of the data. The same data will always create the same hash, but it is impossible to decrypt the data. This is often used to protect passwords, and it's probably why when you forget a password, the site can not tell you what your password was. Instead, it may simply reset the password for you.

Although each type has drawbacks encryption, companies are still working hard to strengthen their encryption methods. For example, some companies use encryption end to end, which means that only the sender and receiver can view the data. It is impossible even for the company that hosts the service to spy on data.

Why Encryption is important

Recently, there has been a lot of buzz in the news about encryption, as some look down on encryption as a tool for terrorists. True encryption, like any other form of technology can be misused, that does not mean strong encryption should be deleted.

Hackers are constantly getting smarter, which means that the safeguards that prevent should also evolve. Without adequate protection, data-sensitive consumers becomes vulnerable to theft.

Recently, the FBI tried to pressure Apple in creating a new version of iOS, or a version with a "back door" that would allow the FBI access data on the phone to a terrorist suspect. Apple has resisted because CEO Tim Cook said: "You can not have a back door that is only for the good guys" Indeed, looking to protect people should not compromise their safety in the process encryption Attenuation.. for the pleasure of catching the bad guys is simply exchanging one problem for another.

Getting encryption profit

many websites use encryption to protect your data sensitive against piracy, but this might not be enough. to protect your information against hackers, you must take additional steps to protect yourself. one way to do this is by using a virtual private network (VPN) which encrypts your data, hiding from prying eyes. Hotspot Shield VPN advocated rights to consumer privacy for over a decade.

encryption is not a tool mystical point that only the bad guys can use. In fact, when encryption is used properly, it is a vital force for good in the cyber universe. Encryption has the potential to secure your data and contribute to your peace of mind.

Previous
Next Post »
0 Komentar