11. Encryption Deep Dive
Encryption has existed throughout human history.
- Early examples include cryptic depictions by cave dwellers in the Magura Cave (Bulgaria) and symbols in the pyramids at Giza.
- Different groups used primitive cryptographic approaches (methods for protecting information).
- This allowed members of a tribe or group to communicate while keeping secrets from rival tribes about hunting grounds or food and water sources.
Basic Encryption Process
- Clear text (information that can be easily read) is the starting point.
- An algorithm (set of rules or software used to process data) is applied.
- The algorithm is activated using an encryption key (special code used to lock or unlock data).
- After encryption, the data becomes cipher text (encrypted information that cannot be read normally).
Key Management
- Key management means protecting and managing encryption keys.
- In commercial environments with many keys, they may be stored and managed on a third-party or external server.
- Keys are protected using a hashing system (method of securing data by converting it into a fixed value).
Asymmetric Encryption
- Asymmetric encryption uses different codes for the sender and the receiver.
- These codes are often certificates (digital credentials used to verify identity).
- This helps confirm that information is sent securely from the sender to the recipient.