301-571-5040    Get SUPPORT

Washington Works Blog

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at 301-571-5040.

Mobile Computing Works to Boost Productivity
Managing Your Software Requires Three Actions


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Hackers Productivity Business Network Security Email Software Tech Term Hosted Solutions Internet Mobile Devices Computer Data Data Backup Backup Ransomware Managed IT Services User Tips Microsoft IT Support Google Data Recovery Innovation Efficiency Hardware Productivity Outsourced IT Managed Service Provider IT Services Small Business Smartphone Cloud Computing Workplace Tips Business Management Social Media Paperless Office Android Encryption Business Continuity Office 365 Save Money Smartphones Windows 10 Windows 10 Collaboration Communication Remote Monitoring Managed IT Services Browser Data Management Server Disaster Recovery Bandwidth Holiday Government Artificial Intelligence Cybersecurity App VoIP Wi-Fi BDR Healthcare Infrastructure Tip of the week Internet of Things Passwords Scam Unified Threat Management Phishing Antivirus BYOD Employer-Employee Relationship Vulnerability IT Management Communications Work/Life Balance Facebook Quick Tips Windows Virtual Reality Maintenance Network Mobile Device Word Saving Money Risk Management Upgrade How To Chrome Managed Service Information Applications SaaS Two-factor Authentication Politics Hosted Solution Office Apps Password Compliance File Sharing Blockchain Document Management Customer Relationship Management Money Big Data Chromebook Data Security Website Remote Monitoring and Management Automobile Business Technology Employees Server Management Machine Learning Automation Remote Workers Virtual Private Network Identity Theft Company Culture Alert Point of Sale Access Control HIPAA Telephone Systems Wireless Health Mobile Security Mobile Device Management G Suite Samsung Firewall Electronic Medical Records Private Cloud Computer Care Smart Technology Physical Security Twitter Taxes Computing Downtime Patch Management Robot Vendor Management Training Router Tech Support Websites Hacker Social Recovery Data loss Remote Computing Meetings Gmail Microsoft Office Botnet Regulations How To IoT Storage VPN Upgrades Mobile Processors Read Only Webcam Printer Wearable Technology Search Test Managed IT Financial Break Fix Users Cookies Analytics Alerts Wires Education Black Friday Social Networking Customer Service Service Level Agreement E-Commerce Fraud Star Wars Vulnerabilities Conferencing IT Support Touchscreen Gadget Legislation Chatbots Settings Google Drive WPA3 RMM Corporate Profile Outlook WiFi Procurement Dark Web Nanotechnology Lenovo Travel Licensing Zero-Day Threat Solid State Drive Statistics Relocation Cleaning Cyber Monday Motherboard Spam Cortana Utility Computing Black Market Features Cost Management Geography Crowdsourcing Instant Messaging Cabling Mouse Identity Emoji Digital Mail Merge Supercomputer Managing Stress Help Desk VoIP Techology SharePoint Fleet Tracking Operating System WannaCry Shortcut GPS Security Cameras Microsoft Excel Screen Reader Electronic Health Records Firefox Superfish Motion Sickness Cooperation Backup and Disaster Recovery Hard Disk Drive Bluetooth Hotspot Assessment Personal Information High-Speed Internet Finance Tablet Professional Services Monitoring Spyware Address IT Budget Enterprise Content Management Bookmarks Avoiding Downtime Web Server Downloads IT Technicians Augmented Reality Update Asset Tracking Tech Terms Monitors Office Tips Tracking Printing Smart Tech Management Cyberattacks Unified Threat Management Staff Legal MSP Human Error Error Distributed Denial of Service Language Internet Exlporer Development Authentication Disaster Heating/Cooling IT Consultant Comparison IBM USB Consulting Digital Payment Connectivity Unified Communications Notifications Favorites Time Management Cameras Multi-Factor Security Mirgation The Internet of Things OneNote Theft Remote Worker IT Solutions Enterprise Resource Planning Files Networking User Error Sports Proactive Permission Staffing Managed IT Service Gadgets Modem Budget Computing Infrastructure Value Computer Repair Cables Authorization Uninterrupted Power Supply Servers Specifications Virtualization Dongle Managed Services Provider Cybercrime Permissions Bring Your Own Device Project Management Network Management Law Enforcement CCTV Google Calendar Employee-Employer Relationship YouTube Administrator ROI Miscellaneous Mobile Office Printers Domains Public Speaking Presentation Regulation Lithium-ion battery Hiring/Firing Wireless Technology 5G Fun Safety CrashOverride Marketing Competition Emergency IP Address Hard Drives