In today’s world, understanding at a minimum basic level how to protect data you’re both storing and transmitting is essential to your business’ survival. information technology professional Mike Chapple shows how to protect confidential information via encryption, and teaches the basics when it comes to selecting an encryption technology.
Encryption provides the ability to use mathematical algorithms to protect the confidentiality and integrity of information transmitted via insecure means or stored in an insecure location. While the detailed mathematics underlying encryption may be intimidating, the basic concepts are quite accessible, and all technology professionals should have at least a basic understanding of how encryption provides these security benefits.
In this article, we take a look at how you can use encryption algorithms to protect confidential information and prove to a recipient or third party that you are the undeniable sender of a message. You’ll also learn the basic principles that should guide the selection of an encryption technology.
Encryption and Decryption
Encryption takes cleartext data and uses a mathematical algorithm, in conjunction with an encryption key, to convert it into a form that is only readable by someone who knows the algorithm that was used and has access to the proper decryption key. This encrypted data is often referred to as the ciphertext. The encryption algorithm may be from one of two classes: symmetric algorithms and asymmetric algorithms.
In a symmetric encryption algorithm, both the sender and the recipient use the same key (known as the secret key) to encrypt and decrypt the message. One very basic symmetric encryption algorithm is known as the rotational cipher. In this algorithm, the sender simply "adds" the key to each character of the cleartext message to form the ciphertext. For example, if the key is 2, "A" would become "C", "B" would become "D", and so on. The recipient would then decrypt the message by "subtracting" the key from each character of the ciphertext to obtain the original message.
Read more from informIT
Get more information by using Google search