Sie sind auf Seite 1von 5

(hp://www.toragecra.

com/log)
()

Jul

31

5 Common Encryption Algorithms and


the Unbreakables of the Future

Contel radford (hp://www.toragecra.com/log/author/contel-radford/)

5 Common Encryption Algorithms and


the Unbreakables of the Future
Jul 31
Contel radford (hp://www.toragecra.com/log/author/contel-radford/)
While ecurit i an aerthought for man PC uer, it a major priorit for
uinee of an ize. It ha to e when the Ponemon Intute
(hp://www.ponemon.org/log/ponemon-intute-releae-2014-cot-of-datareach-gloal-anali) tell u that ecurit reache are cong companie
million ever ear.
ven if ou dont have million to loe, protecng what ou do have hould e a
high priorit.
There are everal form of ecurit technolog availale, ut encrpon i one
that everda computer uer hould know aout.

How Encryption Works


ncrpon i an intereng piece of technolog that work cramling data o
it i unreadale unintended pare. Let take a look at how it work with the
email-friendl oware PGP (hp://en.wikipedia.org/wiki/Pre_Good_Privac)

(or GPG (hp://en.wikipedia.org/wiki/GNU_Privac_Guard) for ou open ource


people).
a I want to end ou a private meage, o I encrpt it uing either one of thee
program. Here the meage:
(/#linkedin)
wUwDPglJu9LOnkAf4vxpQgQZltcz7LWwquhdm5kQIkQlZxtTmaw

q6gVH8imlC3W6TDOhhL2FdgvdIC7Dv7G1Z7pCNzFLp0lg9ACm8r5RZOi

N5ke9cVjlVfgmQ9VpFzwzLLODhCU7/2THg2iDrW3NGQZfz3WviwCe7G
(/#faceook)
mNIvp5jkGPCGcla4Fgdp/xuewPk6NDlewLtHJVf
=PA3
(/#twier)
Once encrpted, the meage literall ecome a jumled me of random
(/#google_plu)
character. ut, equipped with the ecret pacode I text ou, ou can decrpt it

and nd the original meage.


(/#email)
Come on over for hot dog and oda!

(/#xing)
Whether it in tranit like our hot dog part email or reng on our hard drive,

encrpon work to keep pring ee out of our uine even if the happen

to omehow
gain acce to our network or tem.
(hp:/
/www.addtoan.com/hare#url=hp%3A%2F%2Fwww.toragecra.com%2Flog

tle=5%20Common%20ncrpon%20Algorithm%20and%20the%20Unreakale%2
Thi technolog come in man form, with ke ize and trength generall eing

decripon=ncrpon%20come%20in%20man%20form%20and%20it%27%20e
the igget dierence in one variet from the next.
%2C%20ut%20what%20doe%20the%20future%20hold%3F)

1. Triple DES

Triple D (hp://en.wikipedia.org/wiki/Triple_D) wa deigned to replace the


original Data ncrpon tandard (D) algorithm, which hacker eventuall
learned to defeat with relave eae. At one me, Triple D wa the
recommended tandard and the mot widel ued mmetric algorithm in the
indutr.
Triple D ue three individual ke with 56 it each. The total ke length add
up(/#xing)
to 168 it, ut expert would argue that 112-it in ke trength i more like

it.
%2Flog%2F5-common-encrpon-algorithm%2F&
kale%20of%20the%20Future%20-%20torageCra&
Depite lowl eing phaed out, Triple D ll manage to make a dependale
0eenal.%20There%20are%20the%20mot%20common%20encrpon%20tandard

hardware encrpon oluon for nancial ervice and other indutrie.

2. RSA
RA (hp://en.wikipedia.org/wiki/RA_%28crptotem%29) i a pulic-ke
encrpon algorithm and the tandard for encrpng data ent over the internet.
(/#linkedin)
It alo happen to e one of the method ued in our PGP and GPG program.

Unlike Triple D, RA i conidered an ammetric algorithm due to it ue of a


(/#faceook)
pair of ke. Youve got our pulic ke, which i what we ue to encrpt our

meage, and a private ke to decrpt it. The reult of RA encrpon i a huge


atch of mumo jumo that take aacker quite a it of me and proceing
(/#twier)
power to reak.

3. Blowsh

(/#google_plu)

lowh (hp://en.wikipedia.org/wiki/lowh_%28cipher%29) i et another


algorithm deigned to replace D. Thi mmetric cipher plit meage into
(/#email)
lock of 64 it and encrpt them individuall.
lowh i known for oth it tremendou peed and overall eecvene a
(/#xing)
man claim that it ha never een defeated. Meanwhile, vendor have taken full
advantage of it free availailit in the pulic domain.

(hp://www.addtoan.com/hare#url=hp%3A%2F%2Fwww.toragecra.com%2Flog
lowh can e found in oware categorie ranging from e-commerce plaorm
tle=5%20Common%20ncrpon%20Algorithm%20and%20the%20Unreakale%2
for ecuring pament to paword management tool, where it ued to protect

paword. It denitel one of the more exile encrpon method availale.


decripon=ncrpon%20come%20in%20man%20form%20and%20it%27%20e
%2C%20ut%20what%20doe%20the%20future%20hold%3F)

4. Twosh

Computer ecurit expert ruce chneier i the matermind ehind lowh and
it ucceor Twoh (hp://en.wikipedia.org/wiki/Twoh). Ke ued in thi
algorithm ma e up to 256 it in length and a a mmetric technique, onl one
ke i needed.
Twoh i regarded a one of the fatet of it kind, and ideal for ue in oth
hardware and oware environment. Like lowh, Twoh i freel availale to

anone
who want to ue it. A a reult, oull nd it undled in encrpon
(/#xing)
program uch a Photoncrpt, GPG, and the popular open ource oware
%2Flog%2F5-common-encrpon-algorithm%2F&
TrueCrpt (hp://en.wikipedia.org/wiki/TrueCrpt).
kale%20of%20the%20Future%20-%20torageCra&
0eenal.%20There%20are%20the%20mot%20common%20encrpon%20tandard

5. AES
The Advanced ncrpon tandard (A) (hp://en.wikipedia.org
/wiki/Advanced_ncrpon_tandard) i the algorithm truted a the tandard
the U.. Government and numerou organizaon.
(/#linkedin)
Although it i extremel ecient in 128-it form, A alo ue ke of 192 and

256 it for heav dut encrpon purpoe.


(/#faceook)
A i largel conidered imperviou to all aack, with the excepon of rute

force, which aempt to decipher meage uing all poile cominaon in the
128, 192, or 256-it cipher. ll, ecurit expert elieve that A will eventuall
(/#twier)
e hailed the de facto tandard for encrpng data in the private ector.

The Future of Encryption

(/#google_plu)

Cer aack are contantl evolving, o ecurit pecialit mut ta u in the


la concocng new cheme to keep them at a. xpert oerver are hopeful
(/#email)
that a new method called Hone ncrpon (hp://gizmodo.com/neak-honeencrpon-top-hacker--drowning-the-1511718913) will deter hacker
erving up fake data for ever incorrect gue of the ke code. Thi unique
(/#xing)
approach not onl low aacker down, ut potenall urie the correct ke in
a hatack of fale hope. Then there are emerging method like quantum ke

ditriuon
(hp://fortune.com/2013/10/14/unreakale-encrpon-come(hp:/
/www.addtoan.com/hare#url=hp%3A%2F%2Fwww.toragecra.com%2Flog
to-the-u-/), which hare ke emedded in photon over er opc, that might
tle=5%20Common%20ncrpon%20Algorithm%20and%20the%20Unreakale%2
have viailit now and man ear into the future a well.
decripon=ncrpon%20come%20in%20man%20form%20and%20it%27%20e
Whether it protecng our email communicaon or tored data, ome tpe of
%2C%20ut%20what%20doe%20the%20future%20hold%3F)
encrpon hould e included in our lineup of ecurit tool. ucceful aack
on vicm like Target (hp://online.wj.com/new/arcle
/10001424052702303345104579284440022934198) how that it not 100
percent ulletproof, ut without it, oure oering up convenient acce to our
data. Find ome tool that give ou a piece of mind and ck with em!
Photo Credi t : Kev-hine via Flickr (hp://www.ickr.com/photo/kevinhine
/12351110484/in/photolit-jPqQL-dqA5-deaQQX-2hNA-mYGm8JnWxqQ8-8KZAog-ctq1nW-fpVN-ou5H1-9n19mN-6t17G-mWZq-jUGVDx(/#xing)
9eUfFi-ePeawr-dXZi-7xrm5Y-9vQcM-HfVrp-nc3phZ-4nL2-jocCPu-

74oe-neNT-6GfCtH-dJMN6K-8DtuGU-h5pMi-Vam2-6d6LYF-a2rZ%2Flog%2F5-common-encrpon-algorithm%2F&
kale%20of%20the%20Future%20-%20torageCra&
8wmDn-6QDQM-a8oLm-6ohdLp-hVkv3-4THT2X-geY8F-geqQ0eenal.%20There%20are%20the%20mot%20common%20encrpon%20tandard

7ARGi1-7AMUQn-7AMVne-6XVt7-r2qtW-e9XvTQ-G56gp-5CJwx3-4DxeaHfLp4T6)
Tag: curaon (hp://www.toragecra.com/log/tag/curaon/), cer ecurit
(hp://www.toragecra.com/log/tag/cer-ecurit/), data encrpon
(hp://www.toragecra.com/log/tag/data-encrpon/), data protecon
(/#linkedin)
(hp://www.toragecra.com/log/tag/data-protecon/), data ecurit
(hp://www.toragecra.com/log/tag/data-ecurit/), IT indutr
(hp://www.toragecra.com/log/tag/it-indutr/)
(/#faceook)

Comments
(/#twier)

(/#google_plu)

(/#email)

More Links
(/#xing)

2016 torageCra Technolog Corporaon

(hp://www.addtoan.com/hare#url=hp%3A%2F%2Fwww.toragecra.com%2Flog

tle=5%20Common%20ncrpon%20Algorithm%20and%20the%20Unreakale%2

decripon=ncrpon%20come%20in%20man%20form%20and%20it%27%20e
%2C%20ut%20what%20doe%20the%20future%20hold%3F)

(/#xing)

%2Flog%2F5-common-encrpon-algorithm%2F&
kale%20of%20the%20Future%20-%20torageCra&
0eenal.%20There%20are%20the%20mot%20common%20encrpon%20tandard

Das könnte Ihnen auch gefallen