Source: Agency

The History of Encryption and Its Use in the Modern World

| 7.1.22 |


Have you ever read a message you didn't understand or an image you didn't understand? It could be the result of encryption or encryption.

Encryption comes from the Greek word kryptos which means hidden. So, encryption can be interpreted as changing a message to be hidden or must be translated first to be read. The science that studies encryption is called cryptography. The history of cryptography begins in ancient Egypt. The ancient Egyptians used hieroglyphs to write messages. This is the first form of encryption.

Use of encryption in the modern world

In the era of technology that has developed as it is today, cryptography is used to secure data and as a more secure way of communicating. The use of cryptography has the following partial purposes: 

• Protect confidential messages or privacy data and messages that are private or confidential, for example the history of using online transactions and electronic mail. 

• Integrity. The point is that the message sent will be directly received by the intended person, without being known by others. 

• Authentication. This means that both the sender and the recipient of the message can trust the source of the message and believe that the message was delivered to the intended recipient.

In the world of computer science, messages that have not been encrypted are called plain text or clear text. This is a message that can be seen by anyone without any processing. While the message that has been encrypted is called cipher text. This encryption process cannot stop here. After the message is received by the intended recipient, the message must be re-opened in order to be read. The process of returning cipher text to plain text is called decryption.

Cryptographic security

Cryptography must be used wisely following applicable procedures and protocols. This procedure is related to ethics related to human behavior in responding to a message. This protocol is called a cryptosystem. An example of this cryptographic security protocol is by keeping passwords, removing someone's account when not in use, and asking additional questions to ensure the security of user data.

Latest news Update