• About Us
  • Privacy
  • Terms
    • DMCA
  • AdChoices
  • Contact Us
  • Careers
  • Dictionary
  • Donate
Nyongesa Sande
No Result
View All Result
  • Radio
  • Events
  • How To
  • AI
  • Business
    • Shop
    • Money
    • Billionaires
  • Finance
  • Gadgets
  • Lifestyle
  • Sports
  • Autos
Nyongesa Sande
No Result
View All Result
  • Radio
  • Events
  • How To
  • AI
  • Business
  • Finance
  • Gadgets
  • Lifestyle
  • Sports
  • Autos

Home » Why should we care about encryption?

Why should we care about encryption?

January 1, 2024
in Tech Terms
Reading Time: 4 mins read
A A
encryption keeps the transaction

encryption keeps the transaction

SummarizeFacebookXTelegramWhatsappLinkedIn

Every time we make a purchase online, use the bank ATM, text or call somebody, encryption keeps the transaction or communication private and highly secure. Encryption provides a layer of security so information is only accessed by the authorized users. It has become an essential part of our modern day lives. We should care about encryption as it provides privacy, security, integrity of data, and authentication. In many cases it is required for regulatory compliance.

ADVERTISEMENT

What encryption algorithms should I use?

This is a complicated question to answer. When deciding on an encryption algorithm, it is important to consider these questions:

  • Is this algorithm up to date?
  • Has this algorithm been through a validation process?
  • Does the OS, application, or hardware support the encryption?

If any question cannot be answered in the affirmative, either a new algorithm should be chosen or more research should be done.

Because encryption is a constantly changing field, these decisions can be difficult. However, it is important to understand that encryption is very important to security. Making decisions based on partial knowledge about encryption can be dangerous. If you don’t fully understand encryption, make sure you are using crypto designed and built by someone who does understand.

ADVERTISEMENT

How do I send an encrypted email?

To properly encrypt emails, businesses should invest in encryption tools designed for email. When choosing the tools, a business can decide on sender encryption or key management.

  • Sender encryption provides tools for users to encrypt their emails, such as flagging as “urgent” or installing a plug-in with a clickable encryption button. In sender encryption, however, businesses are relying on the judgement of employees to decide what should be encrypted.
  • Key management is typically a central system and set of rules that will act and encrypt emails. This central host can use big data to accurately encrypt sensitive data and information.

How do I detect encrypted threats?

While businesses are encrypting traffic to protect their data, attackers are encrypting threats. As Cisco CEO Chuck Robbins said at Cisco Live, “70 percent of the attacks that are launched are within encrypted traffic.”

Decrypting all traffic, however, would be incredibly time consuming. Businesses must invest in tools that leverage big data to identify potential threats. Machine learning and network analytics can flag obscure indicators and behaviors that suggest an encrypted threat. Once identified, the network can quarantine and investigate the threat before damage occurs.

Types of encryption algorithms

There are two types of encryption algorithms: symmetric (also called shared key algorithm) and asymmetric (also known as public key algorithm).

  • Symmetric encryption uses the same key for encryption and decryption. Because it uses the same key, symmetric encryption can be more cost effective for the security it provides. That said, it is important to invest more in securely storing data when using symmetric encryption.
Image Cisco

Asymmetric encryption uses two separate keys: a public key and a private key. Often a public key is used to encrypt the data while a private key is required to decrypt the data. The private key is only given to users with authorized access. As a result, asymmetric encryption can be more effective, but it is also more costly.

Types of data encryption

Here are some examples of common types of encryption used today.

Triple DES

The Triple Data Encryption Standard (DES), often written 3DES, is a version of the original DES encryption algorithm that encrypts data three times. The Triple DES uses three 64-bit keys, so the key length is 192 bits. Triple DES is a symmetric encryption, and the key is private. Because it encrypts data in 64-bit segments, Triple DES is considered a block cipher. Cipher Block Chaining (CBC), however, is an encryption mode that struggles at high data rates.

ADVERTISEMENT

Blowfish

Blowfish is an encryption technique that was designed by Bruce Schneier in 1993. Similar to Triple DES, Blowfish is a symmetric block cipher. Unlike Triple DES, Blowfish does variable-length key encryption. Rather than set 64-bit segments, Blowfish encrypts segments ranging from 32 to 448 bits. Blowfish is an unpatented and unlicensed encryption technique. For this reason, it is free and available for public use.


RSA

The RSA encryption key, named after creators Ron Rivest, Adi Shamir, and Leonard Adelman, is the standard encryption technique for important data security. RSA is asymmetric cryptography, so there is one public key and one private key. The RSA algorithm uses prime factorization. Simply put, this key requires the factorization of a product involving two large prime numbers. While it seems easy, figuring out these two numbers can be difficult. Even for large computers, it can be expensive and exhaustive to decrypt. While RSA can be very useful, it becomes increasingly inefficient at higher security levels.


AES

Because of an increase in brute-force attacks on the original DES, the Advanced Encryption Standard (AES) was put into place in 2002. AES is a symmetric block cipher that was originally named Rijndael. This block cipher uses three separate keys: AES-128, AES-192, and AES-256. These three keys are used to encrypt and decrypt information of 128 bits. Since its adoption, AES has been used to protect classified government information and sensitive data.


ECC

Elliptic Curve Cryptography (ECC) is a very advanced approach. Often based on a common public key algorithm, ECC combines elliptic curves and number theory to encrypt data. These elliptic curves are within finite fields and are symmetrical over the x-axis of a graph. Given these properties, cryptographers can provide robust security with much smaller and efficient keys. For example, an RSA key of 15,360 bits would be equivalent to an ECC key of just 512 bits.

Source: NIST Special Publication 800-57 Part 1 Revision 4

Was this article helpful?
YesNo
ADVERTISEMENT
Previous Post

What is Encryption?

Next Post

What is an External Hard Drive?

RelatedPosts

What is Anti-Aliasing?
Tech Terms

What is an app drawer?

2 years ago

App drawer is a feature found in mobile device operating systems such as Android. It is a menu that shows...

What is Anti-Aliasing?
Tech Terms

What is Autofill?

2 years ago

Autofill is a feature in many browsers, operating systems, and other programs that allows users to quickly complete online forms...

What are the advantages of using a desktop computer?
Tech Terms

What is a device?

2 years ago

A device refers to an electronic or mechanical tool designed to perform specific functions, typically within the areas of technology,...

What is a 5.25-inch diskette?
Tech Terms

What is a 5.25-inch diskette?

2 years ago

A 5.25-inch diskette, also known as a floppy disk, was a widely used storage medium in the early days of...

What is Anti-Aliasing?
Tech Terms

What is a block?

2 years ago

A block refers to a fundamental concept in various technological and computing contexts. It involves breaking down data or tasks...

What is Anti-Aliasing?
Tech Terms

What is a chipset?

2 years ago

A chipset is a collection of electronic components that work together to enable the functioning of a computer system. It...

What is Anti-Aliasing?
Tech Terms

What is a camera?

2 years ago

A camera is a device that captures light and processes it into an image. It does this through a lens,...

What is Anti-Aliasing?
Tech Terms

What is a blue light filter?

2 years ago

A blue light filter is a feature or software designed to reduce the amount of blue light emitted by electronic...

What is Anti-Aliasing?
Tech Terms

What is a motherboard?

2 years ago

A motherboard is the main circuit board in a computer that connects all the components together. It serves as a...

What is Anti-Aliasing?
Tech Terms

What is clear browser history?

2 years ago

Clear browser history is a fundamental security measure that can protect your computer and personal information. Clear browser history is...

Load More
Next Post
What is an External Hard Drive?

What is an External Hard Drive?

What does Esc stand for in computing and programming?

What does Esc stand for in computing and programming?

Categories

Trending News

  • Thika

    Thika

    518 shares
    Share 207 Tweet 130
  • Top U.S. Clinics for IVF Treatment in 2025

    634 shares
    Share 254 Tweet 159
  • Complete Guide to the FA Cup 2025-26: Draws, Fixtures, Results & Everything You Need to Know

    473 shares
    Share 189 Tweet 118
  • What Is the Juja Preparatory School Fee Structure 2025 – 2026?

    650 shares
    Share 260 Tweet 163
  • List of 2022 – 2027 mps contacts in Kenya

    1105 shares
    Share 442 Tweet 276
  • Msamaria Mwema Shuttle Routes and Prices from Nairobi

    509 shares
    Share 204 Tweet 127
  • Precious Blood Riruta School Fees, KCSE Performance and Contacts

    473 shares
    Share 189 Tweet 118
  • Top 10 Richest People in Shanxi Province (2025)

    482 shares
    Share 193 Tweet 121
  • Top 10 Richest People in South Africa in 2025

    484 shares
    Share 194 Tweet 121
  • The Junction Mall

    494 shares
    Share 198 Tweet 124
ADVERTISEMENT

Shop Best Offers On AliExpress

Support Independent Journalism

If you appreciate our content, help us keep the site running by making a donation.

Donate Now
ADVERTISEMENT
Nyongesa Sande

Nyongesa Sande delivers breaking news, technology updates, billionaire profiles, inventions, AI trends, and inspiring facts.

CC-BY 4.0 Except where otherwise noted, content on this site is licensed under Creative Commons Attribution-Share Alike 4.0 License ; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.

No Result
View All Result
  • Tech News
  • Banking
  • Biography
  • Politics
  • Presidents
  • How To
  • Wiki
  • Real Estate
  • Health
  • Gadget Reviews
  • Top 10
  • History
  • Companies
  • Sports
  • Loans
  • Finance
  • Travel
  • Breaking News
  • AI
  • Electric Vehicle
  • Motivation
  • Phone Prices
  • Hosting
  • Shopping Malls
  • Africa
  • Business
  • Insurance
  • Restaurants
  • Investment
  • Classifieds
  • KenyanBaze
  • Shop Anything

CC-BY 4.0 Except where otherwise noted, content on this site is licensed under Creative Commons Attribution-Share Alike 4.0 License ; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.