The adjective encryption refers to that whose writing is developed with figures: that is, with signs that are used to represent numbers or that can only be understood when the corresponding key is known.
Encryption is a common method in the cryptography (the technique that consists of writing messages in key). What encryption entails, in this case, is a coding the content of the message, protecting it. In this way, only those who know the key to decoding the content can understand the content.
Cryptography, in particular, appeals to a encryption algorithm that makes incomprehensible the message already one key that allows, precisely, to understand it. The plane text, through the encryption process, it becomes a cryptogram (ciphertext).
According to how the algorithm is used, it is possible to differentiate between the block encryption (the message is divided into blocks of equal length and then encryption is carried out) and the stream encryption (bit bit). According to the properties, on the other hand, there is talk of isolated key encryption, identity-based encryption, malleable encryption, secure forward encryption, deniable encryption and others.
However, the list of encryption types that exists is really extensive:
-IDEA encryption, which is based on the existence of eight rounds of identical encryption except for the subkeys used.
-RSA encryption, which is characterized by the fact that the user has two encryption keys: one that is public and the other that is private.
-Blowfish encryption, which uses decimals of “pi”.
-Pigpen encryption, which consists of monoalphabetic substitution in various forms. It must be stated in this sense that it was widely used by the Templars when it came to ensuring the safety of all the pilgrims who were heading to the Holy Land.
-Cipher of Caesar. It receives this name because it was Julius Caesar who used it. It consists of moving the characters of the plain text three spaces to the right.
-Vernam Cipher, which has this name because it was created by the engineer Gilbert Sandford Vernam in the first bars of the 20th century. That one worked for the AT & T Bell Labs company and formed this system that consisted of combining a random data stream of the same size to shape what was a ciphertext.
In addition to all the above, we have to emphasize that during the Second World War a machine called Enigma was created that could be used both to encrypt messages and to decrypt them. It was patented in 1918 by a German company, although it was during the aforementioned war when it reached its heyday.
In the field of musicThe use of signs to express a sound phenomenon is called encryption. In other words, encryption involves using letters or numbers instead of musical notes. The English cipher (also know as american encryption or Anglo-Saxon encryption), for example, uses the following equivalences between letters and notes: A = The, B = Yes, C = Do, D = Re, E = My, F = Fa and G = Sun.