2022, Oct 31
Encryption is what most people think to be very simple, just a quick task that helps encrypt letters and numbers so they are shuffled and mixed up so much that they are unreadable and protected. It's kind of like that but not exactly. It can be difficult to use, it can need a lot of work, complex math, and more. But the truth is that if someone values privacy or prefers that others don't access or read their documents, letters, contracts or business data, they often choose to use encryption. And good encryption software should be easy to use, creates solid strong privacy for you and let's you access encrypted document without any trouble.
Encryption process is not everything that looks like protection of your data. Some task that creates privacy may be slighlty different and useful, but not encryption. Look at this example - original word is COMPUTER, shuffle added creates this result UETMPOCR. Is it encryption? It's not. The only step taken was to change position of all letters. It does create protection, improves privacy and security, but almost everybody is able to figure out the original word.
Example of encryption is again the word COMPUTER encrypted and also using password MIX and the encrypted result is U2FsdGVkX1+PYNxTUfj20xdmR+bTm63uWqQZ/HkpjI0=.
This is very complex method, inefficient, very long result. But if your objective is security and privacy, it will work. Different encryption method can be original word COMPUTER, password MIX and encrypted result B22nbCCWoPViU4r9I41Y1Q==. Again very difficult to use, inefficient and long result, but safe.
Wikipedia describes this -
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.
We will soon introduce project which will use encryption algorithm. It will be very fast, very safe, and it will not be inefficient like samples above. Example could be the original word VERMONT and result after encryption could be JUFEMNA. This is just an example, not specific case. The result will be about as long as the original or even shorter.
When the project is released, we will let you know here on the web site, on Twitter and on other social media. If you'd like to be part of our mailing list, please send us a message.
AMBYTE Vermont, USA
Dec 21, 2024 - Day 356 of this year