Encryption is the process of changing data into a secret code. It is usually carried out today by computers, although in the past it was traditionally carried out by analog machines or by specialists known as cryptographers.
The earliest known form of encryption is that known as "ROT-13", or the "Caesar cipher", because its invention was once reportedly attributed to Julius Caesar. In the Caesar cipher, each letter of the message (or "plaintext") is shifted forward in the alphabet by 13 places; for example, "CIPHER" becomes "PVCURE". The Caesar cipher is what is called a symmetric cipher, meaning that the method of encryption is the same as the method of decryption (rotate by 13 characters), and therefore it is just as easy to decode any message as it was to encode it. For this reason, modern cryptanalysts tend to view most symmetric encryption methods as flawed.
Another popular historical encryption method was the "enigma machine" developed by Nazi Germany during World War II. The enigma machine (or ENIGMA for short) worked on the plugboard principle. It had the ability to generate many different ciphertexts for the same plaintext, which meant that Allied cryptographers could no longer rely on being able to match encoded texts with plaintexts. Prior to World War II, cryptographers had gotten used to being able to collate messages with their ciphertexts to create large "dictionaries" (for example, matching the ciphertext "PVCURE" with its plaintext "CIPHER" in the above example). These code dictionaries could then be used to launch dictionary attacks against messages whose decodings were not yet known. ENIGMA rendered this tactic hopeless. For example, while "PVCURE" might mean "CIPHER" on Monday, it might mean "ATTACK" on Tuesday.
The Enigma cipher was eventually cracked by homosexual British mathematician Alan Turing, with the aid of a computer. This was the beginning of modern cryptography as a science, although few advancements were made from the end of WWII until the rise of the Internet in the 1980s.
Today, encryption is used primarily by hackers and other anti-government types to conceal their activities from the federal government. For example, the leftist GNU organization provides a program called "Pretty Good Privacy" (PGP) for encrypting e-mail. Several forms of "strong" encryption are considered munitions under federal law, and may not be exported to belligerent countries such as Iran.
- Edward J. Snowden
- Julian Assange - Australian leftist hacker
- Bradley Manning - Traitor of State secrets
- Social media: Facebook, Twitter, Google Plus, Youtube, Yahoo
- Big Government-Welfare State-Nanny State-Police State: Globalist-Statist-Socialist-Communist Naughty States
- NSA and other intelligence mass surveillance: PRISM.
- Right to Privacy
- Unalienable rights of the Bill of Rights: First Amendment, Fourth Amendment, Fifth Amendment
- Cryptography and data encryption: Public-key encryption
- Prism-break.org - Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Help make mass surveillance of entire populations uneconomical! We all have an unalienable right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary products and services.
- Open source Free software not Microsoft-Apple-Google-Android
- Duck Duck Go search engine instead of Google, Yahoo and Bing
- Hologram of Liberty - The Constitution's Shocking Alliance With Big Government by Boston T. Party a.k.a.Kenneth W. Royce
- One Nation, Under Surveillance - Privacy From the Watchful Eye by Boston T. Party
- ↑ http://www.webopedia.com/TERM/E/encryption.html
- ↑ Far more likely, however, is that the Caesar cipher was invented by a mathematician in Caesar's employ, and Caesar merely took the credit, much as Henry VIII took credit for the melody of "Greensleeves", or President James Garfield claimed to have discovered a novel proof of the Pythagorean Theorem.
- ↑ The lack of the letters "J", "Q", "U", and "W" in the Latin alphabet posed an impediment to the Caesar shift's widespread adoption, since the encoded ciphertext would actually have read "PVCVRE" and thus had four different possible decodings.
- ↑ http://www.centurionsoft.com/centurionmail/wpencryption.html
- ↑ http://thomasj1776.multiply.com/journal/item/69?&item_id=69
- ↑ "Encryption Export Controls" at stanford.edu