If you talk about encryption, this is a method used to send secret messages. Encryption has a long history, began when the Greeks and Romans to send messages secret. If you wish to know more in-depth encryption, you can follow the explanation #WinExplain WinPoin in the following article.
WinPoin will explain a brief history on the definition of encryption and how and other types of encryption. This discussion will definitely make you interested, especially for you who like to keep a secret.
A Brief History of Encryption
The ancient Greeks used a tool called Scytale to help encrypt a message that they send. This method is faster than using. They will wrap the cylinder with the paper, write a message and send it.
This encryption method is very easy to solve, not surprising since this is the world's first encryption used in the real world.
Julius Caesar using a method somewhat similar to this, shifting each letter of the alphabet to the right or to the left based on the number and position. Tekni This encryption is also called Caesar cipher. For example you can see below cipher, when they want to write WINPOIN then written ZLQSRLQ.
PLAIN: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC
Only the recipient of the message has the cipher will know maksut the message, it will be difficult next person to decode the message.
Examples of other simple encryption cipher is a cipher polyalphabetic Polybius square using the alphabet written on each side of the figure.
What is it and How Does It Work Encryption ??
By using engkripsi above, if you want to write WINPOIN, means enrkipsinya is 15 34 52 12 53 34 52.
Enigma machine
What is it and How Does It Work Encryption ??
You've watched Imitation Game ?? You must already know about the Enigma machine. When World War 2, the Germans used the Enigma machine to get away from the encryption transmission back and forth, it took many years before Poland were able to decipher the message, and provide solutions for the Allies. Make them win of this world war.
Encryption in the history of the Modern Era
Today people do not have a good encryption method to secure communications in the electronic world.
Lucifer is a name given several block cipher when the early, developed by Horst Feistel with her friends at IBM.
Data Encryption Standard (DES) is a block cipher (a form of shared secret encryption) selected by the National Bureau of Standards as a Federal Information Processing Standard (FIPS) in the United States in 1976 were later used extensively and worldwide.
Concerns about security and the development of DES slow operation makes software motivated researchers to propose various alternatives of block cipher design, emerged in the late 1980s and early 1990s. For example, there RC5, Blowfish, IDEA, NewDES, SAFER, CAST5 and Feal.
Rijndael encryption algorithm used by the American administration as sysmmetric-key encryption standard, or Advanced Encryption Standard (AES). AES announced officially by the National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001, after a 5-year standardization process in which there are 15 designs competing for the block cipher encryption algorithm selected to be suitable.
Was Strength Encryption algorithms for
Many encryption algorithms are well known and they all have different functions. They have two characteristics that identify and distinguish between the encryption algorithm with one another is the ability to protect data from attack and the speed and efficiency of doing encryption.
As an easy example to understand is the difference in speed between the various types of encryption, you can use existing benchmarking tool TrueCrypt's volume creation wizard. As you can see, AES this is by far the fastest and strongest encryption type.
What is it and How Does It Work Encryption ??
There is a method of encryption, fast and slow, and they all have different functions. If you want to try to decrypt the data is small, you can use strong encryption or even encrypt twice with different types of encryption. If you need something quickly, you can use AES.
For a comparison or benchmark encryption type, you can see the Washington University of St. Louis, where you can perform various tests on different routines and have an explanation very geek.
Types of Encryption in the Modern Era
All the encryption algorithms we have discussed earlier mostly uses two types of encryption, namely:
Symmetric key algorithms use encryption keys that are related or identical to the encryption and decryption.
Asymmetric key algorithms use different keys for encryption and decryption. This is usually referred to as Public-key Cryptography.
Symmetric key encryption
To explain the concept of this encryption, we'll use a little explanation from Wikipedia to understand how the Symmetric algorithms.
What is it and How Does It Work Encryption ??
Alice put a secret message in the box and lock the box using a padlock and he has the key. Then he sends the box to Bob through regular mail. When Bob receives the box, he used a key verbatim copies owned by Alice to open the box and read the message. Bob can then use the same padlock to membalasa secret message.
From these examples, algorithms sysmmetric-key can be distributed to stream ciphers and block ciphers. Stream ciphers encrypt one by one bit of the message, and actually take some bit block cipher, usually 64bit and encrypt them into one piece. There are many different symmetric algorithms include Twofish, Serpent, AES (Rijndael), Blowfish, CAST5, RC4, TDES, and IDEA.
Asymmetric encryption key
In the method of asymmetric key, Bob and Alice have different padlocks, not the lock with several keys like the example above symmetrick key. Of course, this example is simpler than it should, but it is actually much more complicated.
What is it and How Does It Work Encryption ??
First Alice asks Bob to send an open padlock through regular mail, so that he did not distribute the key. When Alice received it, he uses it to lock in a city that contains a message and send the box with a locked padlock earlier to Bob. Bob then opened the box with a key which he held for the padlock hers to read the message Alice. To reply, Bob must ask Alice to do the same.
The advantage of the method of asymmetric key is Bob and Alice never share their keys. This is to prevent third parties from copying the key or spy on Alice and Bob's messages. In addition, if Bob careless and allow others to copy the key, the message will be disrupted Alice to Bob, but Alice messages to other people would remain secret, because other people would provide their own padlock to Alice to use.
Asymmetric encryption uses different keys for encryption and decryption. The message recipient has a private key and a public key. The public key is given to the sender of the message and they use the public key to encrypt the message. Recipients use the private key to unlock enrkipsi message that was encrypted using the public key of the recipient.
There is one advantage to encrypt using this method. We do not need to send anything confidential (such as our encryption key or password) over an insecure channel. The public key you will leihat to the world and it's not a secret. Lock your secret will remain safe on your computer, where it's place.
How Encryption Security in the Field of Web ??
Over the years, the protocol SSL (Secure Sockets Layer) has been securing web transactions using encryption between the web browser and web server, to protect you from anyone who is stalking you.
SSL itself has a simple concept. Begins when a browser requests a secure page (usually https: //).
Web server sends the public key certificate.
Browser check the certificate issued by a trusted party (usually CA), that the certificate is still valid and the certificate is still associated with the web.
The browser then uses the public key to encrypt a random symmetric key and sends it to the server with the URL terkenkripsi, requiring encryption also http data.
Web server decrypts the encrypted symmetric key using the private key and use sysmmetric key to decrypt the URL and http data.
Web server sends back a request html document and http encryption of data to the browser symmetric key. The browser decrypts the http data and html document mengg unakan symmetric key and displays the information.
What is it and How Does It Work Encryption ??
Necessary understanding of long to know about encryption and bit how it works. Starting from the beginning to understand the encryption in the Greek and Roman era, the emergence of Lucifer and now SSL uses asymmetric and symmetric encryption to secure you from any transaction.
Tidak ada komentar:
Posting Komentar