Tuesday, 10 July 2012

Unique Content Article on Encryption, Encryption Software, Encryption Programs

History Of Encryption


by Ilechukwu Magnus


The truth is that Encryption is no longer a concept. This practice has been around for centuries. During the days of Julius Caesar, he uses simple encryption methods while written messages. He used to shift each of his letter three spaces to the left. This practice is still around today and called the Caesar Cipher.

In ancient Babylonia, merchants used to use intaglio, a flat stone, to carve their specific signature into their images or transaction records. To day, this would be called digital signature. In those days, however, the images, numbers, and symbols used for the signature acted like a type of encryption. It can be their name but written differently and can only be interpreted by people who know what it meant.

As technology began sweeping across the practices of man, encryption changed as well. Let us now bring you a brief history of the modern forms of data encryption and an introduction to today's standard.

DES To AES Encryption

DES, or Data Encryption Standard was the standard encryption that was in use in the 1970's. This algorithm was developed by IBM and improved by the NSA, or National Security Agency. During those days, the DES encryption was virtually unbreakable. DES was a 56-bit key but can be broken if you have the time to try each possible key which is seemingly unrealizable.

However, the face of encryption literally changed in late 1990. People were then able to break the DES in a matter of few days.

This was why DES was officially declared dead and many people started using triple DES and their likes but a more stable solution was sought any way.

A competition for a replacement of DES was announced in January '97 by the National Institute of Standard and Technology. The competition was made open to all and sundry likewise the encryption algorithm was made available to the world. Those who entered the competition were challenged to create a software program that could resist differential and linear cryptanalysis while remaining easy to implement.

Learn how to make the right choice for encryption programs- Three rounds were fought during the competition but finally, a winner was selected. The winners were Vincent Rijmen and Joan Daemen who came out with the Rijmen algorithm. This encryption program was published on November 26, 2001 and has been the standard cipher used in both the commercial industry and the government.

Unlike the previous DES encryption programs, AES uses 128-bit blocks, nearly doubling the possible number of keys and making AES nearly impossible to break into. And, while DES had 16 weak keys, AES has none, improving its strength even more for securing data.

While encryption has undergone several changes, its purpose has not. It is still used to keep contents inaccessible to people who don't have the right to it. If you want to ensure your personal and business information is kept safe, make sure you take advantage of the security encryption can offer.




About the Author:





You are receiving this because you signed up for it on 2011-10-03 from IP 203.109.66.181


To fine-tune your selection of which articles to receive, just login here
using your username:


To unsubscribe please use the following link:

Unsubscribe



No comments:

Post a Comment