Table of Contents Table of Contents
Previous Page  54 / 64 Next Page
Information
Show Menu
Previous Page 54 / 64 Next Page
Page Background

54

S T E M I N C U R R E N T E V E N T S

used by Julius Caesar, simply shifted letters to the right or left by

a predetermined number, so that “A” became “D” and “F” became

“I,” for example. InWorldWar II, the Germans used the Enigma

machine to keep data secret from the Allies, and it took a group

of mathematical code-breakers to figure out the Enigma’s algo-

rithm.Today, encryption is part of the daily fabric of information

technology, particularly when it comes to Internet security.

Advanced Encryption Standard, also known as AES, is a small

variation on Rijndael, a highly advanced encryption algorithm

created by Belgian cryptographers Vincent Rijmen and Joan

Daeman.As

of October 2000, it became the standard encryption

method used by the U.S. government to protect vital national se-

crets.Essentially,AES uses high-level mathematics to break apart

transmitted data into numerous pieces that are later reassem-

bled by a code key. It’s as if someone took “Caesar’s Cipher” and

applied a mathematical formula that made the transposition of

letters and numbers infinitelymore complicated.Without access

to a key, data encrypted by AES is nearly impossible to access.

You can think about encryption methods like a safe; documents

are placed inside and cannot be read unless the safe is opened,

either by a key or a combination lock.However, keys and locks are

not always secure—cryptographic methods must always evolve

to remain effective. Hackers and cybercriminals are constantly

looking for weaknesses in encryption systems.

One of the problems with encrypted data is that it cannot be

processed or analyzed until it is decrypted—taken out of the

“safe”—but providing someone with the key allows them access

to all of the data in the document. This can create privacy and