Encryption
Encryption is the process of transforming information using an algorithm called a cipher to make it unreadable to anyone except those who have special knowledge, refereed to as a key.
Encryption Needs and Usage:-
1. Encryption is generally required for securing communication.
2. It Requires when two parties are communicating and do not want third party to listen in.
3. The objective of Encryption is to protect the company and its assets from hackers.
4. The best way to prevent others from snooping on your communication or accessing you private data is to use strong encryption.
5. Encryption Locks data with Key, so that only someone with a suitable key can unlock it.
6. Encryption protects information as it passes through a network and resides on computer.
7. It ensures the information is received by correct entity and is not modified during transmission.
# The main parts of Encryption is Algorithm and Keys.
1. Algorithm used in computer systems are complex mathematical formulas which dictate how the plain text will be turned in to cipher text.
2. Key is a string of random bits that will be used by the algorithm too add to the randomness of the encryption process.
# For two entities to communicate via encryption, they must use the same algorithm and same key.
2. It Requires when two parties are communicating and do not want third party to listen in.
3. The objective of Encryption is to protect the company and its assets from hackers.
4. The best way to prevent others from snooping on your communication or accessing you private data is to use strong encryption.
5. Encryption Locks data with Key, so that only someone with a suitable key can unlock it.
6. Encryption protects information as it passes through a network and resides on computer.
7. It ensures the information is received by correct entity and is not modified during transmission.
# The main parts of Encryption is Algorithm and Keys.
1. Algorithm used in computer systems are complex mathematical formulas which dictate how the plain text will be turned in to cipher text.
2. Key is a string of random bits that will be used by the algorithm too add to the randomness of the encryption process.
# For two entities to communicate via encryption, they must use the same algorithm and same key.
# Ciphertext - Message altered to be unreadable by anyone except the intended recipients.
Example:-
The Plain text is " My Name is John"
The ciphertect is "NDHCBOLMYIGTVDRS"
Encryption Methods and Protocols:-
The actual process and algorithms by which encryption technologies and software use differ. The current standard specification for encrypting electronic data is Advanced Encryption Standard (AES)
Symmetric VS Asymmetric Key Algorithm
Symmetric Key Algorithm- It uses related often identical keys to both encrypt and then decrypt information. This is generally known as shared secret between two or more parties.
Asymmetric Key Algorithm- It use different keys to encrypt and decrypt information. One key encrypt or locks information while other key decrypt or unlocks it. This is generally known as Public/Private Key. The Public key can be shred openly. Private key should not. In most cryptographic systems, it is extremely difficult to determine the private key values based on Public key.
How Encryption Works:-
Using Public/Private keys, the lock/unlock algorithm can go two ways. John can encrypt some bit of information with Maria's public key and then send to Maria. Only holder of Maria's private key should be able to decrypt and read the message. On other side John could encrypt some bit of information with his own private key and if anyone is world want to read message, they would have to use John's public key to do so which means that message must have come from John.