The modern computer has special fonts that replace each character with a symbol and the sender and receiver do not have to waste time with conversion tables.
The historical methods of encryption are easy to break if an interceptor is given a short period of time. In most cases, they protect the message from wondering eyes. A brief glance at an encrypted message would still be secret. One important element in the encryption process is a secret key. Every method uses a secret key that makes difficult for someone without the key to understand (Beutelspacher, p.14). .
Cryptographic Methods.
There are two standard methods of cryptography, asymmetric encryption and symmetric encryption. Data that is in its original form (such as an email or word document) is called plaintext. Once the data is scrambled and in its encrypted form it is called cipher text. The cipher text, which should be irrelevant to anyone not holding the encryption key, is what is either stored or transmitted to the other key holder. .
Symmetric encryption, also known as private key encryption, uses only one key to encrypt and decrypt the message. This form of encryption was used by Julius Caesar, the Navaho Indians, German U-Boat commanders to present day military, government and private sector applications. It requires all parties that are communicating to share a common key. No public exchange of the key is required. This method is vulnerable if the key is stolen or if the cipher text is broken. .
Asymmetric encryption, also know as public key encryption, uses two separate keys, a public key and a private key. The public key is available to other parties who wish to send data or communicate to the holder of the private key. The private key is available only to the individual receiving the encrypted message. Public key encryption is considered very safe. It uses heavy mathematics, but is susceptible to private key theft or breaking of the private key (this is virtually impossible and would constitute trying billions of possible key combinations).