Friday, 30 May 2014

Encryption


Encryption is the process of encoding messages in an unreadable form or difficult to understand form so that no one can have unauthorized details of the message. In an encryption scheme, the message or information is turned into an unreadable cipher text using an encryption algorithm. Usually in this process the message or information is encoded according to encryption key. At the decoder side, the cipher text is again converted into a message using the decryption algorithm. Here the cipher text is decoded in message using the decryption key. In this process only the authorized receiver that is the receiver having decoding key can only decode the message and hence understands the message or information. Even if the hackers or unauthorized users receive the cipher text, it’s of no use for them until they have a decryption key.

The use of encoding and decoding is as old as the art of communication. Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. For more secured encoding, there are certain computer based encoding algorithms. In this type of communication, decryption is easy if you have a decryption key but when there is more complex encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key.  This process is usually much needed on wireless network as they can be tapped easily. But for sake of security and extra precaution, you need to do this process while transferring highly confidential information like online transactions, Credit-card information, Social Security numbers, Private correspondence, Personal details, Sensitive company information, Bank-account information and many such others. ¬

There are two basic types of encryption schemes: Symmetric-key and public-key. In symmetric-key, the encryption key and decryption key are the same. So the communicating parties must share a common secret key before communication. In public-key, the encryption key is published for anyone to use and encrypt messages but only the intended receiver party has the decryption key and is able to read the encoded messages. Traditionally only symmetric key scheme was used for communication as public key scheme was a later invention.

This process is used by militarizes and governments to facilitate secret communication from a long period of time. But nowadays in addition to militarizes, it is commonly used at many organizations, institutes and other civilian system for data protection against the rivals and other such unauthorized users.
Share this article :

0 comments:

Post a Comment