Saturday, 9 July 2016

What is ENCRYPTION?

What is ENCRYPTION? End-to-End Encryption 




To answer a readers question and others who need to know what encryption is, then lets get to know what ENCRYPTION is and why people fear it. With recent acts of terrorism in Paris and Lebanon, news media, government and with more regulatory commissions requiring encryption and privacy making it being a hot topic, it’s important to understand what encryption is and whether you need it. Everyone is talking about it and have been using the word “encryption” as if it’s somehow to blame. Encryption is easy to understand, and if you’re not using it, you should be.

End-to-End Encryption is a way of scrambling computer data so it can only be read by the people you want

Encryption is the translation of data into a secret code. It is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.

Nowadays it has become ever so important for financial institutions, healthcare practices, legal, law and governmental offices to apply encryption into their systems. This allows them to secure their information, whilst remaining complaint with data protection standards.

There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.


Symmetric Encryption

Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.

Asymmetric Encryption

The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. 

Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

Why encrypt your data?

Data encryption ensures that you can deter hackers and lessen the effect of being a prime target of criminal activities, looking to intercept your data. Often the most valued data is your personal information. Just think of how many emails contain passwords to accounts, medical reports archived, interests displayed, and an insight into all of your personal activities.
With all this, a hacker can spear-phish you and later target you again, with the likelihood of succeeding. This will be done by simply using your details against you, without you even realizing it.

Therefore, it is extremely important to encrypt your information if you work anywhere that handles sensitive information, confidential emails, and if you travel with a notebook or similar device that uses the Internet.

Share this article to friends and also post in your comments and what you need to be answered. 

No comments:

Post a Comment