Encryption and the One-time Pad
There are many ways to scramble, or encrypt, data. How do we determine what constitutes good encryption? Let's try out an example. Enter a word or two you'd like encrypted below.
We converted your
phrase to ALL CAPS and removed all but the Latin characters, in order to
simplify our explanations below. Here it is after conversion:
Here are three different encryptions of your text:
Which one of these was obtained using secure encryption? Here are some facts about the methods used. The first one was used very recently to protect electronic documents against unauthorized copying; at least one programmer was jailed in the US for writing code to break it. The second one has been used for millennia. The third one was patented in 1919, but has seen only limited use.
The first method, known as ROT13, simply substitutes for each letter the letter that is 13 steps away from it in the alphabet (looping back from Z to A if necessary). Thus, A becomes N, B becomes O, C becomes P, and so on. As you can see, the protection it offers can be broken by first-graders. As for the copy protection and the jailed programmer? Here's more on the story.