Skip to main content

Encryption


Meaning: Encryption is the process of encoding a message or information in such a way that only authorized parties can access it

This technology has been around for decades and has been used by various agencies, individuals and independent parties to transmit information between themselves.

One thing to note is that this prevent intermediate intervention but does not take into consideration the integrity of the information. I.e. if a third party may be able to decipher and alter the message this will not be noted by the receiver.

End-to-end encryption: this is still encryption but it makes sure that encryption is carried out on both parties, sender and receiver. With this not only is the message scrambled but only the sender and receiver can only decrypt the message.

How encryption work


This is a very complicated process that basically happens behind the scene but I will try and explain it in simple terms.

First you create a message that you would like to send.

Secondly the message is passed through a special software that will cipher the message making it unreadable. A public and private key is also created in the processes.

As per the terms the receiver is the only one that should have the private key but the sender will use the public key to encrypt.

Thirdly once the receiver gets the message he/she will use the private key to decrypt the message otherwise the message received will not make sense. Once these is done the message we be in plaintext and readable.

There are a gazillion encryption apps and algorithms we will have a quick look on the types and some algorithms used

   Types of encryption


We have two types symmetric and asymmetric.

Symmetric: This has been around for a very long time it uses a secret shares key for encrypting and decrypting. The sender uses the key to encrypt and shares the same key with the receiver so as to decrpt the information. The downside to this is if a third party hets the secret key he can be able to read the message as well.

Asymmetric : also known as public key encryption(PKE). These uses two keys one is made public and the other private.  You encrypt a message with the recipient's public key. The recipient can then decrypt it with their private key. And they can do the same for you, encrypting a message with your public key so you can decrypt it with your private key.

Advantage of these you do not need anyone’s private key to cipher the message when sending to them.

Encryption algorithms


There are several encryption algorithms but will just list a few,
  • Data Encrypton Standard (DES)
  • TripleDES
  • AES
  • RC4, RC5, and RC6




Comments

Popular posts from this blog

Revolutionizing Agriculture: Precision Farming with Drones and Sensors

  Drones in Agricuture In the rapidly evolving world of agriculture, precision farming stands out as a groundbreaking approach that harnesses the power of technology to enhance productivity, sustainability, and efficiency. Among the most transformative tools in this field are drones and sensors, which are redefining traditional farming practices. This article delves into how these technologies are being integrated into modern agriculture, the benefits they offer, and the future they promise. The Rise of Precision Farming Precision farming, also known as precision agriculture, involves the use of technology to manage crops and soil in a more precise and controlled manner. The goal is to optimize field-level management regarding crop farming. Unlike conventional methods that rely on broad-spectrum approaches, precision farming tailors practices to the specific needs of different areas within a field. Drones: Eyes in the Sky Drones, or unmanned aerial vehicles (UAVs), have become an i...

Early Detection of Brain Disorders: Using Wearable Devices Through Eye Movement

 Early Detection of Brain Disorders Using Wearable Devices Through Eye Movement Introduction In recent years, the integration of wearable technologies into healthcare has opened up exciting possibilities for early disease detection. Among these developments, wearable sensors that track eye movement have emerged as a promising tool in diagnosing brain disorders. Eye movement, which is closely linked to brain function, can offer vital clues in detecting neurological conditions such as Parkinson’s disease, Alzheimer’s, and other cognitive impairments. This research addresses a pressing question: Can subtle changes in eye movement patterns be reliably used to detect brain disorders before clinical symptoms become evident? With advancements in precision medicine and AI, the convergence of IT, biomedical engineering, and neuroscience is becoming not only possible but necessary. As a software engineer transitioning into bioinformatics, I see this as a pivotal opportunity to apply data sc...

The future of Artificial Intelligence: trends, challenges, and opportunities

  The future of Artificial Intelligence (AI) is an exciting topic, with many trends, challenges, and opportunities to explore. AI is rapidly advancing and changing the world we live in, from business and healthcare to entertainment and social media. In this blog post, we will dive into some of the latest trends in AI, examine the challenges that come with AI, and explore the opportunities that AI presents. Trends in AI: One of the biggest trends in AI is the development of deep learning algorithms. These algorithms use neural networks to learn from vast amounts of data, making it possible for machines to recognize patterns and make predictions with high accuracy. Another trend is the integration of AI with other technologies, such as the Internet of Things (IoT), which is creating a world where machines are connected and can communicate with each other in real-time. Challenges in AI: One of the biggest challenges in AI is the ethical and moral implications of using AI. As AI become...