What is Encryption?:
Encryption is a method by which when you send a data to write or where to write or store it, then it will be in a state of a form or form that you just created to send the data so that it is accessible only can do. And if it goes wrong to an unwelcome person, then he can not figure out any of the data. This is the original mantra of Encryption. Let’s make the subject more clear by an example. Suppose to create a simple encryption, I write “A” from “A, B, C, D” to “Z” as “B”, “B” as “C” and write as “C” as D. In this way I will write the word that I want to write in the front of the letter. Now I want to write (“TECHUBS”), now after the encryption of the above rule, it will be the word (“UFDIVCT”). Now the code that was created after encryption, if someone does not know that I have used one of the following words to encrypt it, then it will not be possible to find the actual word hidden inside it. And nobody can decode it.
So it was a very simple encryption. Now, what is the “key” if you need to recover the original data from this encryption now? Key will be to reduce a character than what is written. For example, if the code is written in “U”, then if there is less than one character or it will come back “T” will come from “F” and “E”, then the original word is finally available. Now if I send this word to Kauka, and if the person has the right key to the word, then he will be able to read this word very easily. So this is the concept of a simple encryption and its key. We have been using Encryption for a long time. As for the Old World War, the various secret messages were sent through various encryption. But the process of encryption in the computer world is a little different, but the subject matter is the same.
What is Public Key encryption?:
Now let’s talk about the key encryption. This method is very common. And for most encryption, whether it is email or general message or WhatsApp Apps Encryption, public key encryption is used. Now, what is this public key encryption? Think I’m a user and you are a user. Each of us has two keys. In that case, I also have two keys. One is the private key, which is only with me and the other is my public key, which everyone has. And that’s the only thing you’ll have. There will be a private key, which will be with you only, and the other will be the key, which everyone will have. Now again a question, what is the key or the key? See the meaning of private or public words. What is meant here is the formula for encrypted data decoding in this key. That is, the key is to explain how a message can be converted into the original message. Now let’s learn some important things about a public key and private key.
Suppose you locked a message using a public key. So it is possible to open the message only through the private key. Again, if you lock a message with the private key, it is possible to open it using only the public key. Insert this formula well inside the head before understanding more details. Now, I think another user should send a message to “Hello”. So what I will do, another user will have the public key (which is kept by everyone) with the public key, encrypted my message “hello” and send it to him. The user will be able to open the message I sent just by using his private key. If anyone gets the message in the meantime, he will not be able to open it. This way, if I want to secure this message a bit more and if I want to make sure that the message I sent is (the public key is available to everyone, using that anyone can send the message), the first thing I want to send the message to is the public key Lock the message with the key and then the second time I will lock the message with my private key. When the message goes to that user, he will see that “Oh this message is locked by private key”, then he will unlock the first message using his public key, and then using his own private key will unlock the message completely. Friends, the subject matter is a bit of a problem, but hopefully, this paragraph will be cleaned as water after 2-3 times. In other words, it is possible to decrypt the public key (key) by the key and by the private key encryption key. And it works on this formula. This key formula is basically used to transmit any data. For example, if you have logged in an account or sending regular messages to Kaoho, etc., then your data is secured using this method.
But how are the securities that are already stored in the stores? For example, you have uploaded many photos to Google Drive or Dropbox or saved your credit card information on different websites. So to get rid of all these data, there is a help-table approach. Now, what is this has to table? For example, my name is “Fazle Rabbi”. Now I have saved my name on different websites. But if I save using the hash table system, my name will not be saved directly as “Fazle Rabbi”. Rather, they will be saved in a different sense by mixing a lot of text together. And its recovery can be done again by a key. And the key is only on that website. Generally, these types of data are decoded as impossible. But then there is nothing called Impossible in this era of science and technology. Experts are always concerned about how to get information from any place. So there is a rough run on both sides, those security experts think of saving more of their data, and those D-code experts, they always try to find the wrong errors of the encryption.
Generally speaking, these forms of encryption are used more often. But when using most encryption, the public encryption formula is used. Even the latest WhatsApp App’s end-to-end encryption system is also revealed as a public key encryption. Where each user has two keys, where for the public key and for the private key itself. Locking anything using the public key will open it only with your own private key and using some key to open it will only open the public key.