Encryption is the conversation of data into a form called a cipher that
cannot be understood by unauthorized people. The use of encryption is as old
as the art of communication. In Wartime, a cipher, called "Code" can be
employed to keep the enemy from obtaining the contents of transmission.
Simple codes include the, substitution of letters for numbers, the Rotation
of letters in the alphabet, and scrambling of voice signals but inverting the
side band frequencies. More Complex code work according to sophisticated
computer algorithms that rearrange the data bits in digital signals. In order
to easily recover the contents of an encrypted signal, the correct decryption
key is required. The key is an algorithm that "undoes" the 121"' work of
encryption algorithm.
Encryption is especially important in wireless communication because
wireless circuits are easier to tap than regular hardwire counterparts. That
is why encryption is a good idea when carrying out any kind of sensitive
transaction, such as a credit card purchase on line, or the discussion of a
company secret between Merest departments. The stronger the code, the harder
it is for unauthorized people to bread it, the better, (Grant Evans)
In recent years, a controversy has risen over so-called "strong encryption"
which refers to codes that are essentially unbreakable without decryption
keys. While most companies and their customers view it as a means of keeping
secrets and minimizing fraud, some governments view strong encryption as a
potential vehicle by which terrorists might invade governments including the
United States want to set up a "key
Arrangement. This means everyone who uses a code would be required to
Provide the government with a copy of that key. Properties of a strong
encryption method include:
-The security of a strong system resides with the secrecy of the key rather
than with the supposed
Secrecy of the algorithm.
A strong cryptosystem has a large keyspace.
-A strong cryptosystem will produce ciphertext, which appears random to all
standard statistical tests.
-A strong cryptosystem will resist all known previous attacks. A system
which has never been subjected.
(Cnet )
To scrutiny is suspect. In traditional encryption schemes, the sender and
the receiver use the same day to encrypt and decrypt data. Public-key
encryption schemes use two keys: a public key, which anyone may use, and a
corresponding private key, which is possessed only by the person who created
it. With this method, anyone may send a message encrypted with the owner's
public key, but only the owner has the private key necessary to decrypt it.
PGP (Pretty Good Privacy) and DES data encryption standard) are two of the
most popular public-key encryption schemes. Data Encryption Standard (DES) is
a widely used method of data encryption using a private (secret) key that was
judged so difficult to break but the U.S. government that it was restricted
for exportation to other countries. There are 72,000,000,000,000,000
(Quadrillion) or more possible encryption keys that can be used. For each
given message, The key is chosen "At random from among this enormous number
of keys that can be used. Like other private key cryptographic methods, both
the sender and the receiver must know and use the same private key. DES
applies a 56-bit key to each 6&-bit block of data. The process can run in
several modes and involves 16 rounds or operations. Although it is considered
"strong" encryption, many companies use "triple DES", which applies three
keys in succession. This is not to say that a DES-encrypted message cannot be
"broken". (Digital Security)
Early in 1997, RSA, owners of another encryption approach, offered a $
10,000 reward for breaking a DES message. A cooperative effort on the
Internet of over 14,000 computer users trying out various keys finally
figured out the message, discovering the key after running through only 18
quadrillion of the 72 quadrillion possible keys. Few messages sent today with
DES encryption are likely to be subject to this kind of code breaking effort.
DES encryption originated at IBM in 1977 and was adopted by the U.S.
Department of Defense. It is specified in the ANSI X3.92and X3.106 standards
and in the Federal FIN 46 and 81 standards. Concerned that unfriendly
governments could use the encryption algorithm, the U.S. government has
prevented export of the encryption software. However, free versions of the
software are widely available on bulletin board services and Web sites. Since
there is some concern that the encryption algorithm will remain relatively
unbreakable, NIST has indicated DES may not be rectified as a standard and
submissions for its replacement are being accepted. The next standard will be
known 'as the Advanced Encryption Standard (AES). The biggest issue is over
how tightly the government should regulate technology. Law enforcement's
officials would like access to all keys, with a court order. The Clinton
administration has backed them and has fought to limit the strengths of
encryption tools exported from this country. Encryption is a highly
effective tool in the government, schools, private Organization, and most
importantly our own privacy, our home computer. Many people
May not even know that encryption even exist. They are totally oblivious to
what it is. If They only knew that people like hackers could decrypt their home email, or
even pry intoThe credits card and your whole life. The government governs these encryption Codes and some are saying it is unconstitutional, by means of freedom of speech. I don'tQuite understand but I know I'm sure of people minding their business.
Honesty is the best Policy, although things have changed since computers were born. For example
Computer Addicts try to break codes all day and night, they .1ifi by 4 As for our government trying To break codes on nuclear weapons and other countries, I don't know much
about.)