Encryption Algorithms

Encryption algorithm is procedure or formula that helps in the process of encryption and decryption. The algorithm changes the text in to unintelligent text also known as ciphertext. The key purpose of these algorithms is to prevent unauthorized user’s access.

The calculations are performed using string of bits known as “key”. A code is harder to break and descramble, if the key has more bits as number of potential patterns can be created.

Decryption is performed when the correct key is used to decrypt the ciphertext. If there is any modification in the data or the key, the result produced is different.

Types of Encryption Algorithm

There are two types of encryption algorithm based on the key used for encrypting and decrypting:

Symmetric Encryption algorithm or Secret Key algorithms: The key used for encryption and decryption in this category is same; hence it is very important to keep the key safe. Anyone who knows the key can decrypt the data.

Symmetric key encryption can be used for stream cipher or block cipher. Stream cipher encrypts bits of text at a time where as Block cipher encrypts a fixed length of plain text into cipher text at a time.  Some common Block ciphers are AES, Blowfish, DES, Triple, DES, Serpent, Twofish, etc. and RC4, SOBER-128,  VEST, WAKE are some if the Stream ciphers.

Asymmetric Encryption algorithm or Public Key algorithms: The keys used to encrypt and decrypt the message in the asymmetric encryption is not same. Asymmetric key algorithm is the most widely used technique.

This cryptographic technique uses two keys, one private and one public. The private key must be known to the sender and receiver without anyone else knowing it. The public keys can be of three kinds - public key cryptosystems, public key distribution systems and digital signature systems. Some examples of asymmetric algorithms are Blowfish, AES RC4, RC5, and RC6.

Strength of Encryption Algorithms:

The algorithms are designed so that they are strong enough intruders have a hard time to break the key. A theory states, a key can be broken if one tries all the possible combination of the keys. However, the difficulty level increases exponentially if the length of the key is increased. The algorithm used for the encryption is also a key point of the capability of the strength.

Related Information

Recover files from NTFS
With EFS, NTFS files on Windows computer can be encrypted. You might have encrypted some important file, deletion of which can give you a hard time. To recover an encrypted file from your Windows computer, use the Remo Recover (Windows).

Formatted Data Recovery
Encrypted data holds no meaning till it is decrypted. Another user might format data stored on a USB drive, external drive, etc. without considering its importance. Are you suffering loss of encrypted data? Read the above article that explains how to retrieve data from formatted storage devices.     

Safe and Secure
Safe and Secure