Trying to protect important information in a digital environment is not an easy process. You must take steps to protect yourself and your information from being intercepted. One common data defender you can use is encryption.
Encryption is the process of obscuring the data in a file to prevent others from gaining access to its contents. An encrypted file appears as a string of gibberish. For someone to read or use the file, that person must be able to decrypt it. Decryption is the process of translating an encrypted file into its original, readable form. In most cases, only the users with the correct key (a type of password) can make the file readable.
In the electronic world, data encryption has a variety of purposes, including safeguarding data file integrity and protecting e-mail and electronic commerce (e-commerce) transmissions. We also use encryption to authenticate a user's right to access a computer resource and to determine a user's identity across a network.
Different encryption algorithms use proprietory methods of generating keys and are therefore useful for different applications. Strong encyrption is often discerend by the key length used by the algorithm.
One example is the BLOWFISH algorithm. Blowfish is a symmetric block cipher. It takes a variable-length key, from 32 to 448 bits, making it ideal for both domestic and exportable use. Bruce Schneier designed Blowfish in 1993 as a fast, free alternative to the then existing encryption algorithms. Since then Blowfish has been analyzed considerably, and is gaining acceptance as a strong encryption algorithm. The keysizes in this algorithm are so large that it can take hundreds of years for a computer to decrypt data using a brute force attack. More info...