Language Selection

English French German Italian Portuguese Spanish

Encryption: the key to secure data?

Filed under

For as long as modern computers have been around, they have been associated with encryption in one way or another. It is no coincidence that the first semi-programmable computer, Colossus, was developed to decrypt messages during the Second World War.

Encryption relies on encoding information in a way that makes it difficult to decode without either a key (cipher) or an awful lot of mathematical muscle. The longer the length of the cipher (in bits), the more difficult it will be to break. Although there are many encryption techniques that are unbreakable in practice, there are very few that are unbreakable in theory, given enough time or processing power.

Encryption techniques separate into two main types, explains Bernard Parsons, chief technology officer at security software company BeCrypt. Symmetric encryption dates back to the Roman empire and beyond, but asymmetric encryption is more recent.

Commonly used for file encryption, (for example, to protect files on a laptop to hide data in the event of theft), symmetric encryption focuses on using a single cipher to encrypt and decrypt data. "As the field of cryptography became better understood in the public domain, a number of algorithms were proposed, all of them based on difficult mathematical problems," says Parsons.

The trick is to ensure that the mathematical problem is sufficiently complex to stop it being solved by current computing technology. Developing such problems requires not only significant mathematical skill, but also an agreement between multiple parties to use the same mathematical algorithm to encrypt and decrypt data, in order to exchange files.

Consequently, standards became important in the early days of modern computerised encryption in the mid-1970s. One of the first was the Data Encryption Standard (DES), an encryption algorithm using a cipher 56 bits long. DES was at one time considered strong enough to be used for banks' automatic teller machines, but as processing power increased, it was replaced by triple DES, which ran the same piece of data through the DES algorithm three times for extra strength.

"Towards the end of the 1980s questions were asked about the appropriateness of triple DES for a number of reasons, one being performance," says Parsons. A new encryption standard called AES (Advanced Encryption Standard) was established in 2001, and it is still considered to be state-of-the-art.

Full Article.

More in Tux Machines

Open spec SBC dual boots Android and Ubuntu on hexa-core RK3399

T-Firefly is Kickstartering the first hacker SBC with Rockchip’s Cortex-A72/-A53 RK3399. The Firefly-RK3399 has up to 4GB DDR3, M.2, and USB 3.0 Type-C. T-Firefly, which offers Linux- and Android-ready open source boards like the Firefly-RK3288 and sandwich-style Firefly-RK3288 Reload, both of which are based on the quad-core, Cortex-A17 Rockchip RK3288, has advanced to a more powerful Rockchip SoC for its new open spec Firefly-RK3399. The hexa-core Rockchip RK3399 features two server-class Cortex-A72 cores clocked to up to 2.0GHz, as well as four Cortex-A53 at up to 1.42GHz. This appears to be the first RK3399 SBC and the first SBC to include Cortex-A72 cores. Read more

Leftovers: Software

  • Manuskript is a Promising Open-Source Scrivener Alternative
    Whether you plan to work on a book, a screenplay, or better structure your dissertation, you’ll probably see apps like Scrivener recommended. If you’re running Windows, macOS or even Android then you’re spoilt for choice, with various competing proprietary apps at varying price points readily available. On Linux the choices are somewhat limited.
  • Tor 0.2.9 Is Just Around the Corner As Fixes Memory Leak in OpenSSL 1.1
    The past weekend brought us new stable and development builds of the Tor anonymity network project, versioned, as the most advanced version out there, and RC (Release Candidate).
  • Pitivi 0.98 Linux Video Editor Adds Customizable Keyboard Shortcuts
    Version 0.98 of the GNOME-aligned GStreamer-powered Pitivi non-linear video editor was tagged today as the newest development milestone. The main feature addition of Pitivi 0.98 is now supporting customizable keyboard supports! Aside from finally supporting customizable keyboard shortcuts for this open-source video editor, a lot of warnings were fixed from GTK 3.22, and there has been a lot of other bug fixing. Bugs around Pitivi's timeline were primarily targeted by this release.
  • Phoronix Test Suite 6.8-Tana Officially Released
    Phoronix Test Suite 6.8.0 is now available as the latest version of our open-source, fully-automated, reproducible benchmarking software for Linux, BSD, Solaris, macOS, Windows, and other operating systems. Phoronix Test Suite 6.8 is the latest stable release now of our GPL-licensed benchmarking software updated on its regular quarterly release cadence. Phoronix Test Suite 6.8 development focused on a number of low-level improvements to particularly benefit Phoromatic and the Phodevi (Phoronix Device Interface) software/hardware library abstraction layer.
  • iPerf As Another Network Benchmark Is Now Available Via The Phoronix Test Suite
  • Chromium-Based Vivaldi 1.6 Browser Enters Development, Brings Tab Stack Renaming
    Vivaldi's Ruarí Ødegaard informs us about the availability of a new snapshot for the cross-platform, Chromium-based Vivaldi web browser, which promises to let users name tab stacks. Vivaldi Snapshot 1.6.682.3 marks the beginning of the development of Vivaldi 1.6, the next major version of the popular web browser, and it looks like it has been rebased on Chromium 55.0.2883.64. Besides fixing a bunch of regressions, the new development release implements an option under Settings -> Tabs -> Tab Features -> Tab stacking -> Allow Tab Stack Renaming, which lets you rename or name tab stacks.

today's howtos