Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Encryption - Coggle Diagram
Data Encryption
-
Encryption methods
Symmetric:: The sender and receiver have access to the same which is used for both encryption and decryption
Advanced Encryption Standard (AES):: Goes through 10 to 14 rounds of encryption depending on the key length and shifts the characters around in certain ways.
-
-
-
-
Asymmetric: Uses a private and a public keys which are linked, one is used for encryption and the other used for decryption.
-
-
Bits: Binary digits, the smallest unit of data computers can process and store. Represented as 0s and 1s.
The more bits a string has, the more possible combinations exists. Formula: 2^b=N
So for a 128 bit key for an encryption algorithm, it would have a little more that 340 undecillion (38 zeros) values, and for a 256 bit key, a little less than 1.16*10^77 (77 zeros).
As of the end of 2023, the fastest supercomputer is Frontier,
Oak Ridge National Laboratory’s supercomputer which performs 10 quintillion calculations per second. By brute force it would take more than 500 quattuordecillion years (47 zeros) to go through every single combination of a 256 bit key.
A method of protecting data by encoding it so it can only by viewed by people who have access to the correct encryption key