{"id":57123,"date":"2014-01-21T18:10:28","date_gmt":"2014-01-21T23:10:28","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-26T13:45:18","modified_gmt":"2021-08-26T17:45:18","slug":"a-history-of-encryption","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/a-history-of-encryption\/","title":{"rendered":"A History of Encryption"},"content":{"rendered":"<p><a href=\"https:\/\/www.computerhope.com\/jargon\/d\/decrypti.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107614 size-thumbnail\" title=\"A History of Encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-1.jpg?resize=75%2C69&#038;ssl=1\" alt=\"A History of Encryption\" width=\"75\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-1.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-1.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-1.jpg?w=337&amp;ssl=1 337w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Your personal information is under attack from the <a title=\"Tax and Spy: How the NSA Can Hack Any American, Stores Data 15 Years\" href=\"https:\/\/web.archive.org\/web\/20171101063629\/http:\/\/www.dailytech.com:80\/Tax+and+Spy+How+the+NSA+Can+Hack+Any+American+Stores+Data+15+Years\/article34010.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Feds<\/a>, <a title=\"Yikes! Target's data breach now could affect 110M people\" href=\"http:\/\/news.cnet.com\/8301-1009_3-57617034-83\/yikes-targets-data-breach-now-could-affect-110m-people\/?ttag=gpwl\" target=\"_blank\" rel=\"noopener noreferrer\">Target<\/a>, <a title=\"Neiman Marcus confirms data breach, some customers at risk\" href=\"http:\/\/www.washingtonpost.com\/business\/technology\/neiman-marcus-confirms-data-breach-offers-few-details\/2014\/01\/11\/56c6dc7e-7ae1-11e3-af7f-13bf0e9965f6_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">Neiman Marcus<\/a>, and who knows else. One of the keys to keeping your personal information personal are secure passwords. But what makes a password secure? <a title=\"AOL\" href=\"http:\/\/www.aol.com\/\" target=\"_blank\" rel=\"crunchbase noopener noreferrer\">America Online<\/a>\u00a0(<a title=\"AOL\" href=\"http:\/\/www.marketwatch.com\/investing\/stock\/aol\" target=\"_blank\" rel=\"noopener noreferrer\">AOL<\/a>), (<em><strong>rb-<\/strong> Yes they are still around<\/em>) explains the concept of encryption (converting information into code) is not new.<\/p>\n<p>In fact, as you can see below, encryption started with the Spartans in 500 B.C.\u00a0 Yhey would rearrange the position of letters within a text. Through the years, this process has become more sophisticated, which brings us to <a title=\"Advanced Encryption Standard\" href=\"http:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Advanced Encryption Standard<\/a>, or AES, which is what we use today. This standard is based on computing bits, basic units of information. The bits in passwords are what help to keep your data secure. Check out the infographic to see how encryption has evolved from 500 B.C. to the present day and their tips for keeping your passwords safe.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/web.archive.org\/web\/20170823005240\/http:\/\/computercheckup.aol.com:80\/articles\/infographics\/history-of-encryption\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-107617\" title=\"A history of encryption Infographic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_history-of-encryption-480x1024.png?resize=400%2C853&#038;ssl=1\" alt=\"A history of encryption Infographic\" width=\"400\" height=\"853\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_history-of-encryption.png?resize=480%2C1024&amp;ssl=1 480w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_history-of-encryption.png?resize=35%2C75&amp;ssl=1 35w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_history-of-encryption.png?resize=70%2C150&amp;ssl=1 70w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_history-of-encryption.png?resize=768%2C1638&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_history-of-encryption.png?w=900&amp;ssl=1 900w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20140131023024\/http:\/\/mukeshbalani.wordpress.com\/2014\/01\/21\/4-simple-steps-to-make-your-internet-life-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">4 Simple Steps To Make Your Internet Life Secure<\/a> (mukeshbalani.wordpress.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption is the key to keeping your info personal and secure by converting information into code started with the Spartans in 500 BC<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,825,824,69,2048,209,951,2049],"class_list":["post-57123","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-aes","tag-encryption","tag-feds","tag-neiman-marcus","tag-password","tag-pii","tag-target"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/57123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=57123"}],"version-history":[{"count":5,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/57123\/revisions"}],"predecessor-version":[{"id":124873,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/57123\/revisions\/124873"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=57123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=57123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=57123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}