{"id":7977,"date":"2009-05-26T07:31:30","date_gmt":"2009-05-26T12:31:30","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=7977"},"modified":"2009-05-26T07:31:30","modified_gmt":"2009-05-26T12:31:30","slug":"encryption-what-is-it-does-it-work","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/","title":{"rendered":"ENCRYPTION  What is it? Does it work?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/artshot.jpg\" alt=\"artshot\" width=\"150\" height=\"103\" class=\"attachment wp-att-8180 alignleft\" \/><\/p>\n<p>ENCRYPTION: you see the word everyday.  It&#8217;s offered for flash drives, laptops, file storage and email.  It&#8217;s made to sound like it is invincible.  Is it?  Do we need it?  Is it everything we imagine it to be?<\/p>\n<p>The use of encryption  is increasing  as more and more sensitive data is being stored and moved over the www.   Everything from bank accounts to  credit cards need protection from a growing number of savvy and sophisticated thieves.   The simple online purchase of  a tweed kilt can transmit enough personal information to  make your pits sweat.<\/p>\n<p>We all know the extent to which phishing and basic rotten thievery has grown.  Whole industries have been stripped of thousands of identities, your identity. How do we protect ourselves?   Well, we use a SECRET CODE of course.  Just like in the old Military movies and Spy dramas.<\/p>\n<p><strong><U>WHAT IS ENCRYPTION?<\/U><\/strong><\/p>\n<p>Encryption is the process of changing  information into unreadable gibberish.  The information is transformed by an algorithm, cipher or key. Ciphertext is the code and the algorithm is the decoder ring.  Yes,  this is an over simplification but basically it&#8217;s correct.<br \/>\nTypes of encryption include  Symmetric-key encryption and Public-key encryption.<\/p>\n<p><strong>Symmetric Key Encryption<\/strong><\/p>\n<p>In the beginning,  users  were given Symmetric-key Encryption.  It is the one most like a secret code,  as each computer needs the secret key to use the encryption.  The very first Symmetric-key encryption was called <a href=\"http:\/\/www.itl.nist.gov\/fipspubs\/fip46-2.htm\"target=\"_blank\">Data Encryption Standard<\/a> or DES. It uses a 56 bit key. This allows more than 70 quadrillion possible combination.  That sounds like a lot, but computers get faster every day.   It didn&#8217;t take long before a new Symmetric  standard was put in place.  It was called the Advanced Encryption Standard or AES and it uses 128, 192, or 256 bit keys.  Don&#8217;t ask me to say it, but this standard allows for 300, 000,000,000,000,000,000,000,000,000,000,000, key combinations.  That must be enough, right?<\/p>\n<p>No, even symmetric-key encryption is vulnerable, unless  users are communicating through a secure connection.  Without that,  the data and key can easily be discovered by attackers. What was the solution?  Public Key Encryption.<\/p>\n<p><strong>Public Key Encryption<\/strong><\/p>\n<p>In November of 1976, Public-key Encryption was offered up as a better solution.  It uses two  keys, one public and one private, to keep the information safe.  The private key is for your computer only,  and the public key is for computers you are communicating with.  To decode a message, each computer must use the public key and its own private key.  The structure of Asymmetric-key encryption allows for an<em> infinite <\/em>number of key possibilities.<\/p>\n<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/padlock.jpg\" alt=\"padlock\" width=\"300\" height=\"90\" class=\"attachment wp-att-8064 alignleft\" \/><\/p>\n<p>Using Asymmetric-key encryption on a large scale requires the addition of even more code in the form of a digital certificate.  This unique piece of code gives a &#8220;trusted&#8221; designation to  particular entities such as a Web servers.  This &#8220;trusted&#8221; designation is bestowed by an independent source and confirms that the public keys are going to only &#8220;trusted&#8221; computers.  It is one more layer of protection between you and the bad guys.Check your Digital certificates by going to Internet Explorer\/Tools\/Options\/Advanced\/Encryption  area of your browser.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/https.jpg\" alt=\"https\" width=\"150\" height=\"66\" class=\"attachment wp-att-8073 alignright\" \/><\/p>\n<p> SSL or Secure Sockets is an additional layer. SSL was originally developed by Netscape as an Internet Security Protocol.  It has  become an integral part of the web and today&#8217;s Transport Layer Security, TLS.  When you view the http<font color=\"#ff0000\">s<\/font> in your browser or the little padlock  throughout your system, you know that TLS is checking that the certificate is valid, from a trusted site, and is from the site sending it.<\/p>\n<p>The description above is by no means complete, but it should at least give the beginnings of an understanding and a feel for how it&#8217;s progressing.  The important question remains.  Does it work?<\/p>\n<p><strong><U>DOES IT WORK?<\/U><\/strong><\/p>\n<p>In a word, yes.  Today&#8217;s encryption techniques, especially at the file level, are extremely effective.  So effective, that  law enforcement hasn&#8217;t always been able to crack suspect encryption.  Should I and  the hooded <em>Klebold Look-alike<\/em> down the street have access to encryption methods that authorities can&#8217;t crack?  This, of course,  is the endless debate our brave governmental protectors  grapple with.  Should government keep all the good toys for themselves?  I don&#8217;t think so.   Maybe a better debate would be whether encryption should be required by any entity holding or transferring sensitive third party information.<\/p>\n<p> Not being up-to-speed on encryption and the law, I realize I have no idea whether my bank is required to encrypt my personal data.  I cringed when reading an <a href=\"http:\/\/www.crn.com\/security\/210605176;jsessionid=L30GPIPUX54XYQSNDLRSKH0CJUNN2JVN\"target=\"_blank\"> article<\/a> that says Nevada recently put into effect the nation&#8217;s first data encryption law prohibiting  &#8220;businesses from electronically transferring customers&#8217; personal data outside their organization unless it is encrypted.&#8221;  Is that right?  My bank isn&#8217;t &#8220;required&#8221; to encrypt my data?  They&#8217;re only encrypting to avoid a fine after it&#8217;s stolen?<\/p>\n<p>Does all this uncrackable encryption mean you&#8217;re perfectly safe?  No, not any more than the perfect steak guarantees the perfect meal.   How the technology is put together and how it is employed by <strong>YOU<\/strong>, that&#8217;s  the determining factor in security.  <strong>YOU<\/strong> are the Achilles Heel.<\/p>\n<p> In a perfect &#8220;security world&#8221; the user has no input on security implementation.  That&#8217;s great for the perfect world, but that&#8217;s not my world.  I want my data and I want it now,  without a hassle.  That&#8217;s my attitude for everyday computing.  Trying to satisfy me (and you),  has led to increasingly complicated security technologies.   Giving us what we want and maintaining strong security is a tough game,  maybe an impossible game?  When you add to that, the increased theft risk of mobile devices,  it&#8217;s easy to see that problems are only <em>increasing<\/em> as technology continues to permeate our lives.<\/p>\n<p>What was once a matter of securing user data, has now become a matter of securely managing encryption keys.  Maintaining access to data after keys are lost and coping with, security software, passwords, patches,and updates is becoming expensive.  Is the &#8220;Cloud Computing&#8221; we keep hearing about the answer?<\/p>\n<p><strong> Cloud Computing <\/strong><\/p>\n<p>How does cloud computing figure into this mix?  Control of encryption methods and easier to manage encryption protocol are two things that can be improved by cloud computing, but  they can also be abused by cloud computing.  The idea of keeping information in a central location, away from the individual or device accessing the information, is growing.  Companies  are offering this as a safer,  more convenient form of computing. They are benefiting by providing consumers with a &#8220;Safe Shelter&#8221; for performing  their daily tasks.  Is it really safer?  What happens to the data in the event of a bankruptcy?  What happens when a cloud computing entity is sold?  Who is checking on your cloud partner?<\/p>\n<p>Because I know that it&#8217;s the individual that is most likely to cause system vulnerability, my bet is that statistically, Cloud Computing is the safer alternative.  It&#8217;s more likely that my data will be kept safer if someone else is managing it.  That&#8217;s a hard pill to swallow but no harder than when banks came on the scene.  What&#8217;s safer, a bank or a hole in your yard?  Now that I type it out, I&#8217;m not sure.  Where is my money safer?  Where is my personal information safer?<\/p>\n<p> Whether it&#8217;s file storage or system maintenance, cloud computing is gaining in popularity as users better understand that they are the &#8220;fly in the ointment&#8221;, but are we positioned to loosen our grasp.  Is it time to let someone else take care of me?  These are tough questions.<\/p>\n<p>______________________________________________<\/p>\n<p> Discounting sleep, what is the longest you go without touching a cell phone, computer, ipod, game console,  or heart monitor?   Face it, you&#8217;re immersed in technology. You are drowning in it. Does your house have a Command Center?<\/p>\n<p>Your States &#8220;<a href=\"http:\/\/www.credant.com\/resources\/credant-data-compliance-labs.html?gclid=CKPKxMfhu5oCFQIyxwodZjRCVQ\"target=\"_blank\">Security Breech Disclosure Laws<\/a>&#8220;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/encryption.jpg\" alt=\"encryption\" width=\"150\" height=\"145\" class=\"attachment wp-att-8153 alignleft\" \/><\/p>\n<p>Are your bank accounts and passwords safe?  Are your browser settings where they should be?  Is your computer slow because it&#8217;s busy sending your personal information to Russia?<\/p>\n<p>Don&#8217;t become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data.  Use encryption all the way to the file level.  Have you altered or lowered your browser setting recently?  Set them back where they belong.  Your protection is only as good as you allow it to be.  Protect yourself.<\/p>\n","protected":false},"author":7,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[2267,2268,48,2269,2270,81,1218,261,2271,2272],"class_list":["post-7977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-advanced-encryption-standard","tag-bit-keys","tag-computer","tag-decoder-ring","tag-file-storage","tag-information","tag-law","tag-protection","tag-standard","tag-symmetric-key-encryption"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ENCRYPTION What is it? Does it work?<\/title>\n<meta name=\"description\" content=\"Are your bank accounts and passwords safe? Are your browser settings where they should be? Is your computer slow because it&#039;s busy sending your personal information to Russia? Don&#039;t become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data. Use encryption all the way to the file level. Have you altered or lowered your browser setting recently? Set them back where they belong. Your protection is only as good as you allow it to be. Protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ENCRYPTION What is it? Does it work?\" \/>\n<meta property=\"og:description\" content=\"Are your bank accounts and passwords safe? Are your browser settings where they should be? Is your computer slow because it&#039;s busy sending your personal information to Russia? Don&#039;t become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data. Use encryption all the way to the file level. Have you altered or lowered your browser setting recently? Set them back where they belong. Your protection is only as good as you allow it to be. Protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2009-05-26T12:31:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"S.Hogan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"S.Hogan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/\"},\"author\":{\"name\":\"S.Hogan\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/c77560e23beee1fc0225a031e4995d4c\"},\"headline\":\"ENCRYPTION What is it? Does it work?\",\"datePublished\":\"2009-05-26T12:31:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/\"},\"wordCount\":1312,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"advanced encryption standard\",\"bit keys\",\"computer\",\"decoder ring\",\"file storage\",\"information\",\"law\",\"protection\",\"Standard\",\"symmetric key encryption\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/\",\"name\":\"ENCRYPTION What is it? Does it work?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2009-05-26T12:31:30+00:00\",\"description\":\"Are your bank accounts and passwords safe? Are your browser settings where they should be? Is your computer slow because it's busy sending your personal information to Russia? Don't become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data. Use encryption all the way to the file level. Have you altered or lowered your browser setting recently? Set them back where they belong. Your protection is only as good as you allow it to be. Protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/encryption-what-is-it-does-it-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ENCRYPTION What is it? Does it work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/c77560e23beee1fc0225a031e4995d4c\",\"name\":\"S.Hogan\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/shogan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ENCRYPTION What is it? Does it work?","description":"Are your bank accounts and passwords safe? Are your browser settings where they should be? Is your computer slow because it's busy sending your personal information to Russia? Don't become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data. Use encryption all the way to the file level. Have you altered or lowered your browser setting recently? Set them back where they belong. Your protection is only as good as you allow it to be. Protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/","og_locale":"en_US","og_type":"article","og_title":"ENCRYPTION What is it? Does it work?","og_description":"Are your bank accounts and passwords safe? Are your browser settings where they should be? Is your computer slow because it's busy sending your personal information to Russia? Don't become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data. Use encryption all the way to the file level. Have you altered or lowered your browser setting recently? Set them back where they belong. Your protection is only as good as you allow it to be. Protect yourself.","og_url":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2009-05-26T12:31:30+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"S.Hogan","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"S.Hogan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/"},"author":{"name":"S.Hogan","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/c77560e23beee1fc0225a031e4995d4c"},"headline":"ENCRYPTION What is it? Does it work?","datePublished":"2009-05-26T12:31:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/"},"wordCount":1312,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["advanced encryption standard","bit keys","computer","decoder ring","file storage","information","law","protection","Standard","symmetric key encryption"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/","url":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/","name":"ENCRYPTION What is it? Does it work?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2009-05-26T12:31:30+00:00","description":"Are your bank accounts and passwords safe? Are your browser settings where they should be? Is your computer slow because it's busy sending your personal information to Russia? Don't become the fly in the ointment by thinking that your Firewall, Antivirus, or ISP is going to protect your data. Use encryption all the way to the file level. Have you altered or lowered your browser setting recently? Set them back where they belong. Your protection is only as good as you allow it to be. Protect yourself.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/encryption-what-is-it-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ENCRYPTION What is it? Does it work?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/c77560e23beee1fc0225a031e4995d4c","name":"S.Hogan","url":"https:\/\/www.pcmatic.com\/blog\/author\/shogan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/7977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=7977"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/7977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=7977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=7977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=7977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}