{"id":32193,"date":"2017-06-17T17:41:38","date_gmt":"2017-06-17T21:41:38","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-definition-investopedia.php"},"modified":"2017-06-17T17:41:38","modified_gmt":"2017-06-17T21:41:38","slug":"encryption-definition-investopedia","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-definition-investopedia.php","title":{"rendered":"Encryption Definition | Investopedia"},"content":{"rendered":"<p><p>DEFINITION of 'Encryption'    <\/p>\n<p>    Encryption is a means of securing data using a password (key).    The encryption process is simple  data is secured by    translating information using an algorithm and a binary key. When    the data needs to be read back, the code is decrypted using    either the same key or a different key depending on the type of    encryption used.  <\/p>\n<p>    Encryption strength is based on the length of the security key.    In the latter quarter of the 20th century, 40 bit encryption,    which is a key with 240 possible permutations, and 56 bit    encryption was standard. Those keys were breakable through    brute force attacks by the end of the century, and the 128 bit    system became standard in web browsers. The Advanced Encryption    Standard (AES) is a protocol for data encryption created in    2001 by the U.S. National Institute of Standards and    Technology. AES uses a 128 bit block size, but key lengths of    128, 192 and 256 bits. AES uses a symmetric-key algorithm,    meaning the same key is used for both encrypting and decrypting    the data. 128-bit encryption is standard but most banks;    militaries and governments use 256-bit encryption.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.investopedia.com\/terms\/e\/encryption.asp\" title=\"Encryption Definition | Investopedia\">Encryption Definition | Investopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> DEFINITION of 'Encryption' Encryption is a means of securing data using a password (key). The encryption process is simple data is secured by translating information using an algorithm and a binary key. When the data needs to be read back, the code is decrypted using either the same key or a different key depending on the type of encryption used. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32193","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32193"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32193"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32193\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}