Encryption is the process of changing data into a secret code. It is usually carried out today by computers, although in the past it was traditionally carried out by analog machines or by specialists known as cryptographers.
The earliest known form of encryption is that known as "ROT-13", or the "Caesar cipher", because its invention was once reportedly attributed to Julius Caesar. In the Caesar cipher, each letter of the message (or "plaintext") is shifted forward in the alphabet by 13 places; for example, "CIPHER" becomes "PVCURE". The Caesar cipher is what is called a symmetric cipher, meaning that the method of encryption is the same as the method of decryption (rotate by 13 characters), and therefore it is just as easy to decode any message as it was to encode it. For this reason, modern cryptanalysts tend to view most symmetric encryption methods as flawed.
Another popular historical encryption method was the "enigma machine" developed by Nazi Germany during World War II. The enigma machine (or ENIGMA for short) worked on the plugboard principle. It had the ability to generate many different ciphertexts for the same plaintext using different "keys", which meant that Allied cryptographers could no longer rely on being able to match encoded texts with plaintexts. Prior to World War II, cryptographers had gotten used to being able to collate messages with their ciphertexts to create large "dictionaries" (for example, matching the ciphertext "PVCURE" with its plaintext "CIPHER" in the above example). These code dictionaries could then be used to launch dictionary attacks against messages whose decodings were not yet known. ENIGMA rendered this tactic hopeless. For example, while "PVCURE" might mean "CIPHER" using Monday's key, it might mean "ATTACK" using Tuesday's key. However, a letter cannot be encrypted as itself, so no key can decrypt "PVCURE" as "POISON".
The Enigma cipher was eventually cracked by homosexual British mathematician Alan Turing, with the aid of an early computer. This was the beginning of modern cryptography as a science, although few advancements were made from the end of WWII until the rise of the Internet in the 1980s.
Today, encryption is used by hackers and other anti-government types to conceal their activities from the federal government. For example, the leftist GNU organization provides a program called "Pretty Good Privacy" (PGP) for encrypting e-mail. Several forms of "strong" encryption are considered munitions under federal law, and may not be exported to belligerent countries such as Iran.
- List of military strategies and concepts
- War on Drugs and the Police state
- Julian Assange - Australian leftist hacker
- Bradley Manning - Traitor of State secrets
- Social media: Facebook, Twitter, Google Plus, Youtube, Yahoo
- NSA and other intelligence mass surveillance: PRISM.
- Foreign Intelligence Surveillance Act of the Foreign Intelligence Surveillance Court
- Asset forfeiture
- Wiretap - Roving wiretap
- Drug trafficking of the Drug cartels, Gangs, Drug dealers
- Public school values entitlement mentality Indoctrination of the Teacup Generation by Public schools in the United States and Common Core
- Similarities between Communism, Nazism and liberalism
- Barack Obama
- Joseph Stalin
- List of dictators
- Adolf Hitler - Heinrich Himmler, Vladimir Lenin - Leon Trotsky - Joseph Stalin, Mao Zedong - Ho Chi Minh - Kim Jong-Il - Pol Pot, Fidel Castro - Che Guevara
- Dictatorship of the proletariat: Class warfare
- List of Communist States
- List of Socialist States
- Death toll of communism via mass murder - genocide - concentration camp forced labor - extermination camp - firing squad
- Atheism and mass murder
- Coup d'etat
- Cult of personality
- Single-party state
- Mobocracy, Social Effects of the Theory of Evolution, Anti-Semitism, Communist Racism, Genocide, Holocaust
- National Socialist German Workers Party (Nazi)
- Nazism and socialism: National Socialism - the Nazis were elitist Police state liberals not conservatives
- Big government Welfare state leads to Nanny state, leads to Police state: Globalist-Statist-Socialist-Communist
- Liberal totalitarianism
- Unalienable rights of the Bill of Rights: First Amendment, Fourth Amendment, Fifth Amendment
- Right to Privacy
- Conservative values and Libertarian American values of Limited government and liberty
- Electronic Frontier Foundation
- Cryptography and data encryption: Public-key encryption
- Prism-break.org - Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Help make mass surveillance of entire populations uneconomical! We all have an unalienable right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary products and services.
- Open source Free software not Microsoft-Apple-Google-Android
- Duck Duck Go search engine instead of Google, Yahoo and Bing
- Hologram of Liberty - The Constitution's Shocking Alliance With Big Government by Boston T. Party a.k.a.Kenneth W. Royce
- One Nation, Under Surveillance - Privacy From the Watchful Eye by Boston T. Party
- Common law privacy rights
- Electronic Communications Privacy Act of 1986
- Privacy Act of 1974
- Edward J. Snowden
- Libertarian values and Conservative values/Traditional values are the original American Patriot values
- Conservative and Limited government
- American values and Small town values of Real America
- Capitalism and Free enterprise
- Family values and Parental rights: Sanctity of life, Family-Marriage, Homeschooling teaching Virtue, Duty, and Self-reliance
- https://prism-break.org/en - "Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora."
- https://www.eff.org - "Leading the fight against the NSA's illegal mass surveillance program"
- Online Guide to Privacy Resources
- http://www.nocards.org - Coalition Against Unsolicited Commercial Email
- Far more likely, however, is that the Caesar cipher was invented by a mathematician in Caesar's employ, and Caesar merely took the credit, much as Henry VIII took credit for the melody of "Greensleeves", or President James Garfield claimed to have discovered a novel proof of the Pythagorean Theorem.
- The lack of the letters "J", "Q", "U", and "W" in the Latin alphabet posed an impediment to the Caesar shift's widespread adoption, since the encoded ciphertext would actually have read "PVCVRE" and thus had four different possible decodings.
- "Encryption Export Controls" at stanford.edu
- "Help make mass surveillance of entire populations uneconomical. We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services."
- "Organization formed in 1990 to maintain and enhance intellectual freedom, privacy, and other values of civil liberties and democracy in networked communications. Publishes newsletters, Internet Guidebooks and other documents, provides mailing lists and other online forums, and hosts a large electronic document archive. Contact: email@example.com. 454 Shotwell Street, San Francisco, CA 94110-1914. Tel: (415) 436-9333. Fax: (415) 436-9993. Executive Director: Sheryl Steele."
- "EPIC was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical records privacy and the sale of consumer data. EPIC conducts litigation, sponsors conferences, produces reports, publishes the EPIC Alert and leads campaigns on privacy issues. For more information email: firstname.lastname@example.org, or contact EPIC, 1718 Connecticut Avenue, NW, Suite 200, Washington, DC 20009. Tel: (202) 483-1140. Executive Director: Marc Rotenberg."
- "CAUCE is an all volunteer, entirely web-based organization, created by Netizens to advocate for a legislative solution to the problem of UCE (spam). CAUCE began as a discussion group called SPAM-LAW, formed of members who felt that legislation was necessary to stop spam from choking the life out of the Internet. In 1997 CAUCE proposed an amendment to the Federal statute which outlaws junk "faxes" (47 USC 227) to also prohibit junk e-mail, and since then has remained a pre-eminent voice in the anti-spam community. Email: email@example.com. President: Edward Cherlin."