We have so much vital information in our life, and increased penetration of internet in our lives, has only made the information more insecure. We have to find ways to make it secure and hidden from others. Information like our bank account number, credit card number, income tax number, email passwords and social networking passwords need to be protected, because if they get into the wrong hands, they can make unsolicited usage of it. May be even causing dent to your financial reputation.
For this purpose we require data encryption, looking at this word many questions arise, what is it, how does it work, how efficient it is, how does it help us.
These all questions are answered below:
• Encryption is the process of encoding information in such a way that only the person with the key can decode it. It is called ciphering and deciphering. They are basically keys to our locks, and locks range from a varied number of bank account pins to your social networking password. Encryption is used for storing, hide and sending passwords to make sure that no one can understand them.
• It is also used to promote e-commerce on the Internet to protect credit card information during various transactions made online. Encryption prevents unauthorized access to our emails. It provides access to eligible person with the proper key to the prescribed levels of information. The encryption keys to be used as password should always be alpha numeric, to make it tot the strongest level of encryption so that it is hardest to break. There are two basic key systems, secret-key and public-key cryptography, in encryption.
• The Data Encryption system is a system in which no documents are involved. A password is generated by the user and saved only on the server and it remains there only. This system is not meant to be used to conduct business on internet. While public key system is meant for conducting and making transactions online. In it a public key is created and to crypt and decrypt the messages involved in the transactions. The data is encrypted using as private key on his computer, and this cryptic message can be only opened on the systems using the public key which can shared only by the user.
• Similarly vice versa the data encrypted using a public key can be decrypted using only the private key. Thus level of secrecy is maintained and the transaction remains secure and safe. Keys are the final step of the encryption. More varied and long the keys, more the combinations that can be made. Thus increasing the level of difficulty to decipher it. If your encryption program uses 128-bit keys, your particular key could be any of more than 3.4 trillion billion or 2 to the power of 128 possible combinations of zeros and ones.
With increased phishing and unsolicited means of breaking in to the private data of public, encryption is the only resort to protect it all.