Skip to main content

Encryption


Meaning: Encryption is the process of encoding a message or information in such a way that only authorized parties can access it

This technology has been around for decades and has been used by various agencies, individuals and independent parties to transmit information between themselves.

One thing to note is that this prevent intermediate intervention but does not take into consideration the integrity of the information. I.e. if a third party may be able to decipher and alter the message this will not be noted by the receiver.

End-to-end encryption: this is still encryption but it makes sure that encryption is carried out on both parties, sender and receiver. With this not only is the message scrambled but only the sender and receiver can only decrypt the message.

How encryption work


This is a very complicated process that basically happens behind the scene but I will try and explain it in simple terms.

First you create a message that you would like to send.

Secondly the message is passed through a special software that will cipher the message making it unreadable. A public and private key is also created in the processes.

As per the terms the receiver is the only one that should have the private key but the sender will use the public key to encrypt.

Thirdly once the receiver gets the message he/she will use the private key to decrypt the message otherwise the message received will not make sense. Once these is done the message we be in plaintext and readable.

There are a gazillion encryption apps and algorithms we will have a quick look on the types and some algorithms used

   Types of encryption


We have two types symmetric and asymmetric.

Symmetric: This has been around for a very long time it uses a secret shares key for encrypting and decrypting. The sender uses the key to encrypt and shares the same key with the receiver so as to decrpt the information. The downside to this is if a third party hets the secret key he can be able to read the message as well.

Asymmetric : also known as public key encryption(PKE). These uses two keys one is made public and the other private.  You encrypt a message with the recipient's public key. The recipient can then decrypt it with their private key. And they can do the same for you, encrypting a message with your public key so you can decrypt it with your private key.

Advantage of these you do not need anyone’s private key to cipher the message when sending to them.

Encryption algorithms


There are several encryption algorithms but will just list a few,
  • Data Encrypton Standard (DES)
  • TripleDES
  • AES
  • RC4, RC5, and RC6




Comments

Popular posts from this blog

Revolutionizing Agriculture: Precision Farming with Drones and Sensors

  Drones in Agricuture In the rapidly evolving world of agriculture, precision farming stands out as a groundbreaking approach that harnesses the power of technology to enhance productivity, sustainability, and efficiency. Among the most transformative tools in this field are drones and sensors, which are redefining traditional farming practices. This article delves into how these technologies are being integrated into modern agriculture, the benefits they offer, and the future they promise. The Rise of Precision Farming Precision farming, also known as precision agriculture, involves the use of technology to manage crops and soil in a more precise and controlled manner. The goal is to optimize field-level management regarding crop farming. Unlike conventional methods that rely on broad-spectrum approaches, precision farming tailors practices to the specific needs of different areas within a field. Drones: Eyes in the Sky Drones, or unmanned aerial vehicles (UAVs), have become an i...

Early Detection of Brain Disorders: Using Wearable Devices Through Eye Movement

 Early Detection of Brain Disorders Using Wearable Devices Through Eye Movement Introduction In recent years, the integration of wearable technologies into healthcare has opened up exciting possibilities for early disease detection. Among these developments, wearable sensors that track eye movement have emerged as a promising tool in diagnosing brain disorders. Eye movement, which is closely linked to brain function, can offer vital clues in detecting neurological conditions such as Parkinson’s disease, Alzheimer’s, and other cognitive impairments. This research addresses a pressing question: Can subtle changes in eye movement patterns be reliably used to detect brain disorders before clinical symptoms become evident? With advancements in precision medicine and AI, the convergence of IT, biomedical engineering, and neuroscience is becoming not only possible but necessary. As a software engineer transitioning into bioinformatics, I see this as a pivotal opportunity to apply data sc...

Apple’s 2024 Keynote: New Calculator App for iPad and More!

 As a self-proclaimed non-Apple fanboy, I have to admit, Apple's latest keynote had a few surprises that even caught my attention. Among the usual fanfare of sleek designs and incremental updates, Apple dropped a few notable bombs, including the long-awaited launch of a native  Calculator app for the iPad. Yes, you read that right. The iPad finally has a calculator, and it’s bringing some extra features to the table like Math Notes and Apple Pencil support. Let’s dive into what went down at the keynote and why it might be worth paying attention, even if you’re not an Apple devotee. The Headline Act: Calculator App for iPad For years, iPad users have been scratching their heads wondering why Apple, in all its innovative glory, never included a basic calculator app on its tablets. Well, the wait is finally over. Apple has introduced a Calculator app that goes beyond mere arithmetic. The app includes Math Notes, which allows users to jot down notes and calculations side-by-side. ...