Chapter 4: Introducing Symmetric Encryption
Today, we use cryptographic algorithms, techniques, and processes to secure our data that is either in motion or at rest. One of the driving factors in this effort is the need for businesses to adhere to standards, such as the Payment Card Industry Data Security Standard (PCI DSS). However, on a personal level, each of us wants to keep our private data just that: private. Every day, malicious actors launch a variety of attacks to try to gain access to our data. Nevertheless, with strong algorithms that are properly implemented, cryptographic tools and techniques will continue to secure our data and transactions.
In this chapter, you'll gain a better understanding of how symmetric encryption quickly and efficiently secures data. We'll see its humble beginnings, with scientist Horst Feistel of International Business Machines (IBM) creating the Feistel network, a foundational element for every modern-day block cipher. We'll...