Encryption

**Encryption**

[|Encryption] software is software whose main task is encryption and decryption of data, usually in the form of files or in the form of packets sent over computer networks. Encyption is the process of transforming information using as algorithm (called a [|cipher]) to make it unreadable to anyone except those possesing special knowledge, usually reffed to as a key. The result is encrypted information. The reverse process to make the encrypted information readable again, is reffered to as a decryption. Encryption has longe been used by militaries and governments to facilitate secret communication. It is not commonly used in protecting information within many kinds of civilian systems. The [|Computer Security Institute] reported that in 2007 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encyrption for some of their data in storage. Encrypton can be used to protect data such as files on computers and storage devices like USB flash drives. In recent years there have been numerouse reports of personal records being exposed through theft or loss of laptops and backup drives. [|Digital rights managment] systems which prevent unauthorized use or reproduction of copyrighted material and protected software against reverse engineering are another somewhat different example of using encryption on data at rest. Encryption is also used to protect data in transit, for example data being transferred via networks. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a [|message authentication code] or a [|digital signiture]. One or the earliest public key encryption applications was called [|Pretty Good Privacy]. Digital signiture and ecryption must be applied as message creation time to avoid tampering.

**__Geman Enigma__**

Home

Encryption Advantages and Disadvantages

Sources