crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Tales from the Crypt-ography
Even ancient rulers and civilizations knew of the importance of protecting sensitive information. Cryptography is a practice that came about during the times of the pharaohs of Ancient Egypt and has lingered ever since in some form or another. Modern cryptography and encryption is still used to keep intercepted messages and data secure, and older forms of this were no exception. The general idea behind cryptography is that there is a cipher and a key to decode the cipher.

The earliest known cipher was used during the time of Julius Caesar. This method substituted letters in the normal alphabet with others a few spaces away. Caesar did this in all of his official communications, allowing only those privileged few who were literate and understood the replacement key, the ability to know what the messages truly meant. Cryptography would continue to evolve over the next 1,300 years, evolving drastically from the cipher Caesar utilized.

Historians have discovered that cryptography developed dramatically over the past 700 years, and it’s all thanks to the invention of polyalphabetic ciphers. Encryption underwent a sort-of “renaissance” of its own in the Venetian city-states of what is now modern-day Italy. In particular, Leon Battista Alberti is remembered as the “Father of Western Cryptography” for the use of his Alberti cipher, a polyalphabetic cipher that used the decoder ring that is most commonly associated with the holiday staple, A Christmas Storyi. Be sure to drink your Ovaltine.

Encryption in the modern world has since exploded. From the Playfair cipher to the German Enigma machine, these coded messages were a necessity to preserve the integrity of messages during transit. Encryption today is no exception to this rule.

Modern Encryption
Encryption is more important than ever. Computing has evolved considerably over the past 60 years, and encryption has had a lot to do with it. Encryption is a mainstay in some of the most popular technology solutions out there. It’s used every time you make a purchase with a credit card, or make a call or text with your smartphone. Encryption basically still works in the same way by using a cipher and a key, but it’s much more complicated than the more simplistic versions used in the past. We’ll walk you through how two of the more popular encryption algorithms work: symmetric and asymmetric.

Symmetric Key Algorithms
In the case of symmetric key algorithms, the encryption keys are the same for both the process of encryption and decryption. Think of it as the same key working for both the front door and the back door of your house. A better example is that a user can unlock a box with a key, but only if it is the same version of that key configuration, meaning that as long as it’s a copy of that exact same key, the box can be opened.

Asymmetric Key Algorithms
Asymmetric key algorithms work with two different sets of keys: a public key and a private key. Each person who can see the message has access with a public key, but to open the message itself, they need to have a private key exclusive to them. This added layer of security can help to improve privacy. Granted, this is only a very basic explanation of what these complex encryption protocol accomplishes.

Popular Types of Encryption
Here are some of the most popular forms of modern encryption:

  • AES: Advanced Encryption Standard is a symmetric encryption algorithm that uses a block cipher to encrypt data one block at a time. There are three different types of this encryption: AES-128, AES-192, and AES-256.
  • 3DES: Triple Data Encryption Standard is a symmetric encryption protocol that takes advantage of three separate 56-bit keys. It encrypts it three times for a total of 168-bit.
  • Twofish: Twofish is a symmetric block cipher based on Blowfish. It provides up to 256-bit encryption and can be used without restriction.

Where Encryption Sees Use
Chances are that if you’re using the Internet, you’re using some type of encryption. There are a lot of websites that utilize Secure Socket Layer, or SSL, to keep the transfer of data secure and private. This is used to keep personally identifiable information safe, like passwords and credit card numbers, just in the event that the browser you’re using isn’t secured. If the website you’re visiting doesn’t use SSL, chances are that the browser will inform you. Other services also take advantage of encryption, such as email, file transfer, or remote access to your network.

Do you better understand encryption now? To learn more, call us today at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 17 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Best Practices Business Computing Saving Money Productivity IT Services Workplace Tips Hosted Solutions Backup Hackers Malware Email Mobile Devices Software Business IT Support Data Hardware Small Business Network Communication Server Smartphones Upgrade VoIP Business Continuity Google Computer Windows Mobile Device Management Efficiency Disaster Recovery Virtualization Microsoft Office Innovation Miscellaneous Mobile Office Vendor Management Holiday Gadgets Social Media BYOD Data Backup Tech Term Quick Tips Passwords Outsourced IT Network Security Android Smartphone User Tips Mobile Computing Browser Managed IT services WiFi Bring Your Own Device Windows 10 Internet of Things Ransomware Spam Best Practice The Internet of Things Remote Monitoring Apple Remote Computing Alert Users Data Recovery Data Management Trending Operating System Wireless Technology Content Filtering Going Green Artificial Intelligence History Gmail Firewall Unified Threat Management Save Money Router Printer Tech Support Encryption Information Technology Current Events App Managed IT Big Data Office Analytics Customer Relationship Management IT Solutions Lithium-ion Battery Facebook IT Consultant Antivirus Document Management Humor Saving Time Cloud Computing Avoiding Downtime Employer-Employee Relationship Paperless Office Maintenance Hard Drives Productivity Applications Collaboration Two-factor Authentication IT Support Windows 8 Automation Marketing Excel Office Tips Retail Phishing Compliance IT service Cybersecurity Digital Payment Mobile Device Chrome Business Growth VPN Wi-Fi Risk Management Apps Bandwidth Application Virus Customer Service Website Hacking Computers Fax Server Phone System Outlook Health Managed IT Services Proactive IT Computer Repair Managed Service Government Inbound Marketing Mouse Recovery Money Net Neutrality Running Cable Social Project Management Licensing Regulations File Sharing PowerPoint Social Networking Training Tablet Data Security Office 365 Password iPhone User Error Unified Communications Co-Managed IT Infrastructure Administration Presentation Augmented Reality Budget Sports Hacker Data loss Blockchain Scam HIPAA User Point of Sale Programming BDR Company Culture Analyitcs Twitter Redundancy Education Safety Specifications IBM Settings Files Cost Management Wireless Internet Exlporer Storage Cybercrime Save Time Mobility Smart Technology Wearable Technology Mobile Security Hiring/Firing Display Alerts IoT Flexibility Hosted Solution Data storage Help Desk Tip of the week Statistics Intranet Robot Competition Business Intelligence Network Congestion Printing End of Support Recycling eWaste Downtime LiFi Computing Search USB Piracy Virtual Desktop Business Owner Vulnerability Travel Technology Tips Drones Computer Accessories Information Cookies Heating/Cooling Management Consumers Social Engineering Crowdfunding Buisness Identities Virtual Private Network Technology Laws Comparison Backups Nanotechnology Enterprise Resource Planning IP Address How To Permissions Scheduling CIO Solid State Drive MSP IT Technicians Telephony Unified Threat Management Identity Theft Black Friday Disaster Legal Touchscreen Screen Reader Refrigeration Mobile Assessment Fraud Alt Codes Proactive Mirgation Access Control Cyber Monday Digital Signature Smart Tech Managing Stress IT Management Memory YouTube Typing Remote Monitoring and Management Laptop Business Technology Machine Learning SharePoint Google Drive Connectivity Enterprise Content Management Network Management Documents How To Conferencing Cryptocurrency WPA3 Halloween Networking Migration Entrepreneur Private Cloud Downloads Distributed Denial of Service Google Docs Macro PC Care Undo Vulnerabilities 5G Windows 10 Hotspot PDF Value People Bitcoin eBay Fleet Tracking Scary Stories Chatbots Public Cloud Multi-Factor Security Software Tips Managed IT Service Remote Support Leadership Star Wars Geography Language Skype Streaming Media communications New Additions Gaming Console Hacks Text Messaging Asset Tracking Identity Sync Google Calendar Print Server Utility Computing Domains Break Fix Work Station High-Speed Internet Fun Server Management Computing Infrastructure LinkedIn Techology Congratulations Legislation Law Firm IT Video Surveillance OneNote Word Mobile Device Managment Healthcare Public Speaking Dark Web Windows 8.1 Update Development Cortana Cooperation Best Available Virtual Reality Disaster Resistance Employee-Employer Relationship Motherboard Hard Drive Data Warehousing Monitors Deep Learning Cables Knowledge Patch Management Staff Environment SaaS IT Consulting Adminstration G Suite Software as a Service Bluetooth 3D Google Wallet Remote Workers Modem Cache Microsoft Excel Online Currency Writing Samsung Wires Experience Operations Troubleshooting Chromebook Data Breach Debate

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...