Encryption software uses algorithms to turn readable text into unreadable code, which can only be undone by a passphrase or key. The Advanced Encryption Standard (AES) is the current US government standard, while asymmetric encryption schemes use a pair of keys for added security in emails. Many encryption programs are available online, with AES-type programs recommended for stored data and volume encryption, and asymmetric key pair-based programs for email encryption.
Encryption software turns readable text into unreadable code by applying algorithms that can only be undone by the passphrase or key. There are secure forms of encryption and there are insecure forms, as weak algorithms can be cracked by the same computer power that generates strong algorithms. The current standard adopted by the US government is the Advanced Encryption Standard (AES), which is based on 128-bit blocks. The previous standard known as Data Encryption Standard (DES) is based on 56-bit blocks and is now considered insecure.
The AES standard was drawn from a larger pool of algorithms developed by Joan Daemen and Vincent Rijmen of Begium. Their encryption software is known as Rijndael. Two examples of competing encryption software in this category include Twofish and Serpent.
Encryption software such as AES, Twofish and Serpent rely on a single password or shared key to encrypt and decrypt data and are therefore known as symmetric schemes. This type of encryption software is used to protect stored data. It can also be used to encrypt an entire volume or hard drive. To use the drive, you must mount the volume using a passphrase. When you unmount the drive, the volume reverts to its encrypted state.
Asymmetric encryption schemes use a pair of keys to encrypt and decrypt data. This type of encryption is often used in emails and other forms of communication. The key pair includes a private key and a public key that are linked or associated. The public key can be freely given to anyone to be used to encrypt data sent to the owner of the public key. Once something has been encrypted using the public key, only the private key of that key pair, held in confidence by the owner, can decrypt the data. Asymmetric encryption software is considered more secure than symmetric schemes because the decryption key is not shared.
In secure email conversations, both parties use encryption software to generate their own key pairs, then exchange public keys. Now each person can send encrypted mail to the other, and upon arrival, that person uses their private key to decrypt the mail. These operations can be done without problems through email plug-ins used with encryption software. Pretty Good Privacy® (PGP) is encryption software that works with some popular email programs, and the open source version of PGP known as GnuPG can also be used with the Enigma plug-in in Mozilla® Thunderbird® for encryption and automatic decryption.
There are a myriad of encryption programs available online, many free. If you’re looking for something to protect your stored data or for volume encryption, AES-type programs work well. If you’re looking to encrypt your email, asymmetric key pair-based programs offer the best security. In the latter case, different programs might work with each other in some cases, but it’s probably easier for people new to encryption to use the same encryption software to ensure compatibility.
Protect your devices with Threat Protection by NordVPN