{"id":1911,"date":"2019-04-23T16:02:45","date_gmt":"2019-04-23T16:02:45","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1911"},"modified":"2020-05-01T12:00:22","modified_gmt":"2020-05-01T12:00:22","slug":"common-usage-of-encryption","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/","title":{"rendered":"Common Usage of Encryption"},"content":{"rendered":"\r\n<p><span style=\"font-size: 12pt;\">The purpose of this article is to provide information in the area of practical cryptography of interest to anyone wishing to <a href=\"http:\/\/www.kruptos2.co.uk\/index.html\">use Encryption Software<\/a>. This post covers starting from what is encryption, how encryption works, requirement for encryption and common usage of encryption in real world with examples.<\/span><\/p>\r\n<h2><span style=\"font-size: 12pt;\"><b>What is Encryption?<\/b><\/span><\/h2>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\"><b>Encryption<\/b>\u00a0is the conversion of information into an\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptography\"><span class=\"s1\">cryptographic<\/span><\/a> encoding that can&#8217;t be read without a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Key_(cryptography)\"><span class=\"s1\">key<\/span><\/a>. Encrypted data looks meaningless and is extremely difficult for unauthorized parties to decrypt without the correct key.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Cryptography is the art or science of secret writing, or more exactly, of storing information (for a shorter or longer period of time) in a form which allows it to be revealed to those you wish to see it yet hides it from all others.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">A cryptosystem is a method to accomplish this. Cryptanalysis is the practice of defeating such attempts to hide information. Cryptology includes both cryptography and cryptanalysis.<\/span><\/p>\r\n<h2 class=\"p1\"><span style=\"font-size: 12pt;\"><strong>How Encryption Works?<\/strong><\/span><\/h2>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">The original information to be hidden is called &#8220;plaintext&#8221;. The hidden information is called &#8220;ciphertext&#8221;. Encryption is any procedure to convert plaintext into ciphertext. Decryption is any procedure to convert ciphertext into plaintext.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">A cryptosystem is designed so that decryption can be accomplished only under certain conditions, which generally means only by persons in possession of both a decryption engine (these days, generally a computer program) and a particular piece of information, called the decryption key, which is supplied to the decryption engine in the process of decryption.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Plaintext is converted into ciphertext by means of an encryption engine (again, generally a computer program) whose operation is fixed and determinate (the encryption method) but which functions in practice in a way dependent on a piece of information (the encryption key) which has a major effect on the output of the encryption process.<\/span><\/p>\r\n<figure id=\"attachment_1918\" aria-describedby=\"caption-attachment-1918\" style=\"width: 743px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/cryptographic.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1918\" src=\"http:\/\/www.kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/cryptographic-300x169.png\" alt=\" Encryption Key\" width=\"743\" height=\"419\" srcset=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/cryptographic-300x169.png 300w, https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/cryptographic-768x432.png 768w, https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/cryptographic.png 1000w\" sizes=\"auto, (max-width: 743px) 100vw, 743px\" \/><\/a><figcaption id=\"caption-attachment-1918\" class=\"wp-caption-text\"><span style=\"font-size: 12pt;\">What is Encryption<\/span><\/figcaption><\/figure>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">A cryptosystem could be designed which made use of several different methods of encryption, the particular method chosen for a particular encryption process being key-dependent. <\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">The combination of encryption methods results again in an encryption method, which is just as deterministic as a simpler cryptosystem, although probably harder for a cryptanalyst to crack.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">A good cryptosystem should in fact vary the details of its encryption method in a key-dependent way, though high security does not require the combination of distinct encryption algorithms.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">The result of using the decryption method and the decryption key to decrypt ciphertext produced by using the encryption method and the encryption key should always be the same as the original plaintext (except perhaps for some insignificant differences).<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">In this process the encryption key and the decryption key may or may not be the same. When they are the cryptosystem is called a &#8220;symmetric key&#8221; system; when they are not it is called an &#8220;asymmetric key&#8221; system. <\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">The most widely-known instance of a symmetric cryptosystem is DES (the so-called &#8220;Data Encryption Standard&#8221;). The most widely-known instance of an asymmetric key cryptosystem is PGP (&#8220;Pretty Good Privacy&#8221;).<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">An encryption algorithm (a precise specification of the steps to be taken when encrypting plaintext and when decrypting the resulting ciphertext) is known as an &#8220;asymmetric algorithm&#8221; if the encryption and decryption keys that it uses are different; otherwise it is a &#8220;symmetric algorithm&#8221;.<\/span><\/p>\r\n<h2 class=\"p1\"><span style=\"font-size: 12pt;\"><strong>Benefits for using Encryption:<\/strong><\/span><\/h2>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">There are many reasons for using encryption (examples are given below), and the cryptosystem that one should use is the one best suited for one&#8217;s particular purpose and which satisfies the requirements of security, reliability and ease-of-use.<\/span><\/p>\r\n<ul class=\"ul1\">\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">Ease-of-use is easy to understand.<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">Reliability means that the cryptosystem, when used as its designer intended it to be used, will always reveal exactly the information hidden when it is needed (in other words, that the ciphertext will always be recoverable and the recovered data will be the same as to the original plaintext).<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">Security means that the cryptosystem will in fact keep the information hidden from all but those persons intended to see it despite the attempts of others to crack the system.<\/span><\/li>\r\n<\/ul>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">When selecting an encryption, or cryptographic software, you should first consider what you want it to accomplish. There are numerous (entirely law-abiding) reasons why you might wish to conceal information, for example:<\/span><\/p>\r\n<ol class=\"ol1\">\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">Companies often possess data files on employees which are confidential, such as medical records, salary records, etc. Employees will feel safer knowing that these files are encrypted and are not accessible to casual inspection by data entry clerks (who may be bribed to obtain information on someone).<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">Individuals may share working space with others, of whose honor they are not entirely sure, and may wish to make certain that in their absence no-one will find anything by snooping about in their hard disk.<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">A company may wish to transfer sensitive business information between sites such as branch offices. Or it may wish to send confidential information (for example, a negotiating position, operating procedures or proprietary data) to an agent in the field (perhaps abroad). If the information is encrypted before transmission then one does not have to worry about it being intercepted since if this happens the encrypted data is incomprehensible (without the encryption key).<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">A company may have information that a competitor would like to see, such as information concerning legal or financial problems, results of research, who the customers are and what they are buying, information revealing violations of government regulations, secret formulas or details of manufacturing processes, plans for future expansion or for the development of new products.<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">A person or company may wish to transport to a distant location a computer which contains sensitive information without being concerned that if the computer is examined en route (e.g. by foreign customs agents) then the information will be revealed.<\/span><\/li>\r\n<li class=\"li1\"><span style=\"font-size: 12pt;\">Two individuals may wish to correspond by email on matters that they wish to keep private and be sure that no-one else is reading their mail.<\/span><\/li>\r\n<\/ol>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">From the above examples it can be seen that there are two general cases when encryption is needed:<\/span><\/p>\r\n<ol>\r\n<li class=\"p1\"><span style=\"font-size: 12pt;\">(a) When information, once encrypted, is simply to be stored on-site (and invulnerable to unauthorized access) until there is a need to access that information.<\/span><\/li>\r\n<li class=\"p1\"><span style=\"font-size: 12pt;\">(b) When information is to be transmitted somewhere and it is encrypted so that if it is intercepted before reaching its intended destination the interceptor will not find anything they can make sense of.<\/span><\/li>\r\n<\/ol>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">In case (b) there arises the problem of secure key exchange. This problem exists because the person who will decrypt the information is usually not the same as the person who encrypted the information. <\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Assuming that the decryptor is in possession of the decryption engine (normally a piece of software) how does the decryptor know which decryption key to use? <\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">This information must be communicated to the decryptor in some way. If, during the course of this communication, the key is intercepted by a third party then that third party can intercept and decrypt the cipher text subsequently sent by the encryptor to the decryptor.<\/span><\/p>\r\n<h2 class=\"p1\"><span style=\"font-size: 12pt;\"><strong>Common usage of <span class=\"s1\"><a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">encryption<\/a>:<\/span><\/strong><\/span><\/h2>\r\n<h3 class=\"p3\"><span style=\"font-size: 12pt;\"><b>Filesystems<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">A filesystem such as a hard drive in a laptop may be encrypted such that a\u00a0<a href=\"http:\/\/www.kruptos2.co.uk\/k2help\/windows\/passwords.html\"><span class=\"s1\">password<\/span>\u00a0<\/a>is required to access data.<\/span><\/p>\r\n<h3 class=\"p3\"><span style=\"font-size: 12pt;\"><b>Devices<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Devices such as <a href=\"http:\/\/www.kruptos2.co.uk\/android.html\">mobile phones<\/a> may be designed to use encrypted data storage by default.<\/span><\/p>\r\n<h3 class=\"p3\"><span style=\"font-size: 12pt;\"><b>Files<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\"><a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">A single file can be encrypted<\/a>. This can be done in addition to file system encryption. For example, a password management application will may encrypt its data with a\u00a0<span class=\"s1\">master password<\/span>.<\/span><\/p>\r\n<h3 class=\"p3\"><span style=\"font-size: 12pt;\"><b>Communication<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Communication links such as a connection between a website and a browser are commonly encrypted using a standard known as <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\">SSL (Secure Sockets Layer)<\/a>. <\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Messages between a website and a browser may traverse vast physical distances and pass through many machines on the way.\u00a0<a href=\"http:\/\/www.kruptos2.co.uk\/encryption.html\"><span class=\"s1\">Encryption<\/span><\/a>\u00a0is intended to prevent anyone between the sender and receiver from accessing the data being sent.<\/span><\/p>\r\n<h3 class=\"p3\"><span style=\"font-size: 12pt;\"><b>Digital Certificates<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Digital certificates are a means of confirming the identity of information services. An organization publishes its company name and a\u00a0<span class=\"s1\">public key<\/span>\u00a0in a digital certificate issued by a certificate authority.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\"> If you\u00a0<a href=\"http:\/\/www.kruptos2.co.uk\/encryption.html\"><span class=\"s1\">encrypt<\/span><\/a>\u00a0a message with that\u00a0<span class=\"s1\">public key<\/span>, only the organization listed in the certificate should be able to decrypt that message with its corresponding\u00a0<span class=\"s1\">p<\/span><span class=\"s1\">rivate key<\/span>.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">This is used to verify the identity of web sites by sending them a\u00a0<span class=\"s1\">secret code<\/span>\u00a0encrypted with a public key from a certificate and testing if they are able to decrypt the message and send the secret code back to you.<\/span><\/p>\r\n<h3 class=\"p4\"><span style=\"font-size: 12pt;\"><b>Non-repudiation<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Encryption based technologies such as digital certificates are commonly used to\u00a0<span class=\"s1\">d<\/span><span class=\"s1\">ocument proof<\/span>\u00a0that a transaction occurred and was authorized by a particular individual or company. <\/span><span style=\"font-size: 12pt;\">This is known as non-repudiation.<\/span><\/p>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\"> For example, if a customer presents a smart card and a password when they purchase something it is difficult for them to claim they didn&#8217;t make the purchase.<\/span><\/p>\r\n<h3 class=\"p4\"><span style=\"font-size: 12pt;\"><b>Authentication<\/b><\/span><\/h3>\r\n<p class=\"p1\"><span style=\"font-size: 12pt;\">Encryption is widely used in\u00a0<span class=\"s1\">authentication<\/span>\u00a0protocols to test the identity of a smart card, device or information service. This is typically based on\u00a0<span class=\"s1\">public key cryptography<\/span>\u00a0whereby a secret is encrypted with a public key to confirm that an entity is in possession of the corresponding\u00a0<span class=\"s1\">priv<\/span><span class=\"s1\">ate key<\/span>.<\/span><\/p>\r\n<h2>Conclusion<\/h2>\r\n<p>There are full of suspicious people on the Internet, and you need to protect<br \/>your identity and your most sensitive data from prying eyes.<\/p>\r\n<p>That\u2019s why we developed Encryption Softwares for <a href=\"https:\/\/www.kruptos2.co.uk\/kruptos2.html\">Windows<\/a>,\u00a0<a href=\"https:\/\/www.kruptos2.co.uk\/kruptos2mac.html\">macOS<\/a>,\u00a0<a href=\"https:\/\/www.kruptos2.co.uk\/android.html\">Android<\/a>\u00a0and even\u00a0<a href=\"https:\/\/www.kruptos2.co.uk\/kruptos2go.html\">USB sticks<\/a>. With just one click or drag and drop, you can easily protect your most important data and become anonymous online.<\/p>\r\n<p class=\"p1\">\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>The purpose of this article is to provide information in the area of practical cryptography of interest to anyone wishing to use Encryption Software. This post covers starting from what is encryption, how encryption works, requirement for encryption and common usage of encryption in real world with examples. What is Encryption? Encryption\u00a0is the conversion of &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\"> <span class=\"screen-reader-text\">Common Usage of Encryption<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1916,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,37],"tags":[42,33,43],"class_list":["post-1911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-online-safety","tag-device","tag-encryption","tag-filesystem"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common Usage of Encryption - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"The purpose of this article is to provide information in the area of common usage of encryption to anyone wishing to use Encryption Software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Usage of Encryption - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"The purpose of this article is to provide information in the area of common usage of encryption to anyone wishing to use Encryption Software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-23T16:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-01T12:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"927\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"Common Usage of Encryption\",\"datePublished\":\"2019-04-23T16:02:45+00:00\",\"dateModified\":\"2020-05-01T12:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\"},\"wordCount\":1576,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png\",\"keywords\":[\"device\",\"Encryption\",\"filesystem\"],\"articleSection\":[\"Data Protection\",\"Online Safety\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\",\"name\":\"Common Usage of Encryption - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png\",\"datePublished\":\"2019-04-23T16:02:45+00:00\",\"dateModified\":\"2020-05-01T12:00:22+00:00\",\"description\":\"The purpose of this article is to provide information in the area of common usage of encryption to anyone wishing to use Encryption Software.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png\",\"width\":927,\"height\":521,\"caption\":\"Usage of Encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common Usage of Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Usage of Encryption - Kruptos Security Blog","description":"The purpose of this article is to provide information in the area of common usage of encryption to anyone wishing to use Encryption Software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Common Usage of Encryption - Kruptos Security Blog","og_description":"The purpose of this article is to provide information in the area of common usage of encryption to anyone wishing to use Encryption Software.","og_url":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-04-23T16:02:45+00:00","article_modified_time":"2020-05-01T12:00:22+00:00","og_image":[{"width":927,"height":521,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png","type":"image\/png"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"Common Usage of Encryption","datePublished":"2019-04-23T16:02:45+00:00","dateModified":"2020-05-01T12:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/"},"wordCount":1576,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png","keywords":["device","Encryption","filesystem"],"articleSection":["Data Protection","Online Safety"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/","url":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/","name":"Common Usage of Encryption - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png","datePublished":"2019-04-23T16:02:45+00:00","dateModified":"2020-05-01T12:00:22+00:00","description":"The purpose of this article is to provide information in the area of common usage of encryption to anyone wishing to use Encryption Software.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/04\/encryption.png","width":927,"height":521,"caption":"Usage of Encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/common-usage-of-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Common Usage of Encryption"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1911"}],"version-history":[{"count":10,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1911\/revisions"}],"predecessor-version":[{"id":2240,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1911\/revisions\/2240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1916"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}