The encrypted adjective refers to what is written with figures: that is, with signs that are used to represent numbers or that can only be understood when the corresponding key is known.
According to DigoPaul, encryption is a common method in cryptography (the technique of writing messages in key). What the encryption implies, in this case, is an encoding of the content of the message, protecting it. In this way, only those who know the key to decoding the content can understand the content.
Cryptography, in particular, appeals to an encryption algorithm that makes the message incomprehensible and to a key that allows, precisely, to understand it. Plain text, through the encryption process, is converted into a cryptogram (ciphertext).
According to how the algorithm is used, it is possible to differentiate between block encryption (the message is divided into blocks of equal length and then encryption proceeds) and stream encryption (bit by bit). Depending on the properties, on the other hand, talking about encryption key isolated, based encryption identity, encryption malleable, strong encryption forward, encryption deniable and others.
However, the list of types of encryption that exists is really extensive:
-IDEA encryption, which is based on the existence of eight rounds of identical encryption except for the subkeys used.
-RSA encryption, which is characterized because the user has two encryption keys: one that is public and the other that is private.
-Blowfish encryption, which uses decimals of “pi”.
-Pigpen encryption, which consists of monoalphabetic substitution in various forms. It must be stated in this sense that it was widely used by the Templars when it came to ensuring the safety of all the pilgrims heading to the Holy Land.
-Cipher of Caesar. It receives this name because it was Julius Caesar who used it. It consists of shifting the characters of the plain text three spaces to the right.
-Vernam Cipher, which has this name because it was created by the engineer Gilbert Sandford Vernam in the first bars of the 20th century. That one worked for the AT & T Bell Labs company and formed this system that consisted of combining a random data stream of the same size to shape what was a ciphertext.
In addition to all the above, we have to emphasize that during the Second World War a machine called Enigma was created that could be used both to encrypt messages and to decrypt them. It was patented in 1918 by a German company, although it was during the aforementioned warfare when it reached its heyday.
In the field of music, the use of signs for the expression of a sound phenomenon is called encryption. In other words, encryption involves using letters or numbers instead of musical notes. The English encryption (also known as American encryption or encryption Anglo – Saxon), for example, use the following equivalences between letters and notes: A = La, B = Si, C = Do, D = Re, E = Mi, F = Fa and G = Sol.