Encryption is the conversation of data into a form called a cipher that

cannot be understood by unauthorized people. The use of encryption is as old

as the art of communication. In Wartime, a cipher, called "Code" can be

employed to keep the enemy from obtaining the contents of transmission.

Simple codes include the, substitution of letters for numbers, the Rotation

of letters in the alphabet, and scrambling of voice signals but inverting the

side band frequencies. More Complex code work according to sophisticated

computer algorithms that rearrange the data bits in digital signals. In order

to easily recover the contents of an encrypted signal, the correct decryption

key is required. The key is an algorithm that "undoes" the 121"' work of

encryption algorithm.

Encryption is especially important in wireless communication because

wireless circuits are easier to tap than regular hardwire counterparts. That

is why encryption is a good idea when carrying out any kind of sensitive

transaction, such as a credit card purchase on line, or the discussion of a

company secret between Merest departments. The stronger the code, the harder

it is for unauthorized people to bread it, the better, (Grant Evans)

In recent years, a controversy has risen over so-called "strong encryption"

which refers to codes that are essentially unbreakable without decryption

keys. While most companies and their customers view it as a means of keeping

secrets and minimizing fraud, some governments view strong encryption as a

potential vehicle by which terrorists might invade governments including the

United States want to set up a "key

Arrangement. This means everyone who uses a code would be required to

Provide the government with a copy of that key. Properties of a strong

encryption method include:

-The security of a strong system resides with the secrecy of the key rather

than with the supposed

Secrecy of the algorithm.

A strong cryptosystem has a large keyspace.

-A strong cryptosystem will produce ciphertext, which appears random to all

standard statistical tests.

-A strong cryptosystem will resist all known previous attacks. A system

which has never been subjected.

(Cnet )

To scrutiny is suspect. In traditional encryption schemes, the sender and

the receiver use the same day to encrypt and decrypt data. Public-key

encryption schemes use two keys: a public key, which anyone may use, and a

corresponding private key, which is possessed only by the person who created

it. With this method, anyone may send a message encrypted with the owner's

public key, but only the owner has the private key necessary to decrypt it.

PGP (Pretty Good Privacy) and DES data encryption standard) are two of the

most popular public-key encryption schemes. Data Encryption Standard (DES) is

a widely used method of data encryption using a private (secret) key that was

judged so difficult to break but the U.S. government that it was restricted

for exportation to other countries. There are 72,000,000,000,000,000

(Quadrillion) or more possible encryption keys that can be used. For each

given message, The key is chosen "At random from among this enormous number

of keys that can be used. Like other private key cryptographic methods, both

the sender and the receiver must know and use the same private key. DES

applies a 56-bit key to each 6&-bit block of data. The process can run in

several modes and involves 16 rounds or operations. Although it is considered

"strong" encryption, many companies use "triple DES", which applies three

keys in succession. This is not to say that a DES-encrypted message cannot be

"broken". (Digital Security)

Early in 1997, RSA, owners of another encryption approach, offered a $

10,000 reward for breaking a DES message. A cooperative effort on the

Internet of over 14,000 computer users trying out various keys finally

figured out the message, discovering the key after running through only 18

quadrillion of the 72 quadrillion possible keys. Few messages sent today with

DES encryption are likely to be subject to this kind of code breaking effort.

DES encryption originated at IBM in 1977 and was adopted by the U.S.

Department of Defense. It is specified in the ANSI X3.92and X3.106 standards

and in the Federal FIN 46 and 81 standards. Concerned that unfriendly

governments could use the encryption algorithm, the U.S. government has

prevented export of the encryption software. However, free versions of the

software are widely available on bulletin board services and Web sites. Since

there is some concern that the encryption algorithm will remain relatively

unbreakable, NIST has indicated DES may not be rectified as a standard and

submissions for its replacement are being accepted. The next standard will be

known 'as the Advanced Encryption Standard (AES). The biggest issue is over

how tightly the government should regulate technology. Law enforcement's

officials would like access to all keys, with a court order. The Clinton

administration has backed them and has fought to limit the strengths of

encryption tools exported from this country. Encryption is a highly

effective tool in the government, schools, private Organization, and most

importantly our own privacy, our home computer. Many people

May not even know that encryption even exist. They are totally oblivious to

what it is. If They only knew that people like hackers could decrypt their home email, or

even pry intoThe credits card and your whole life. The government governs these encryption Codes and some are saying it is unconstitutional, by means of freedom of speech. I don'tQuite understand but I know I'm sure of people minding their business.

Honesty is the best Policy, although things have changed since computers were born. For example

Computer Addicts try to break codes all day and night, they .1ifi by 4 As for our government trying To break codes on nuclear weapons and other countries, I don't know much

about.)