Encryption 101: Keys, Algorithms and You

In today’s world, understanding at a minimum basic level how to protect data you’re both storing and transmitting is essential to your business’ survival. information technology professional Mike Chapple shows how to protect confidential information via encryption, and teaches the basics when it comes to selecting an encryption technology.

Encryption provides the ability to use mathematical algorithms to protect the confidentiality and integrity of information transmitted via insecure means or stored in an insecure location. While the detailed mathematics underlying encryption may be intimidating, the basic concepts are quite accessible, and all technology professionals should have at least a basic understanding of how encryption provides these security benefits.

In this article, we take a look at how you can use encryption algorithms to protect confidential information and prove to a recipient or third party that you are the undeniable sender of a message. You’ll also learn the basic principles that should guide the selection of an encryption technology.

Encryption and Decryption

Encryption takes cleartext data and uses a mathematical algorithm, in conjunction with an encryption key, to convert it into a form that is only readable by someone who knows the algorithm that was used and has access to the proper decryption key. This encrypted data is often referred to as the ciphertext. The encryption algorithm may be from one of two classes: symmetric algorithms and asymmetric algorithms.

Symmetric Encryption

In a symmetric encryption algorithm, both the sender and the recipient use the same key (known as the secret key) to encrypt and decrypt the message. One very basic symmetric encryption algorithm is known as the rotational cipher. In this algorithm, the sender simply "adds" the key to each character of the cleartext message to form the ciphertext. For example, if the key is 2, "A" would become "C", "B" would become "D", and so on. The recipient would then decrypt the message by "subtracting" the key from each character of the ciphertext to obtain the original message.

Read more from informIT

Post a Comment

Leave your comment below
The comment is moderated. Only comments related to the post will be accepted.
Your name
Email address
Your comment

Read Comments No comment yet Comment feed

No comments yet.
You can get this information from:
Close this window
Email This Information
To send the message, please fill the form below
Email To
Your Email

Please enter the text on the following image in the verification box below. Click here if you cannot read the text. All alphabets are in upper case.

Verification image