Since companies began to systematize the processes of buying and selling, since social networks became relevant within our different societies; computer security became a fundamental part of any public or private organization. All infrastructure had to be protected and not only physically.
Today, the largest companies in the world keep infinite amounts of data from different users around the world, this information is the “most precious” asset since they use it to investigate the lives of consumers in order to know them more and sell them plus. However, there are also antonyms within the digital world that want to steal such information for malign practices. Thanks to different professionals that have emerged in the area, it has been possible to create systems that help protect different files (data) to the point of only authorized personnel can get to see it. These systems are the Encryption Algorithms, which in the present are the most “effective and efficient” tools to fulfill their objective. The current algorithms that dominate the market are AES (Advanced Encryption Standard – Advanced Standard Encryption) also known as Rijndael, but although it is not created at the time of the procedure both are different, since the AES allows lower range of block size and length of keys, the opposite of Rijndael. On the other hand, we have the encryption from Extreme to Extreme, this in turn is very used by those companies that offer an instant messaging service, the algorithm works generating a type “DNA” for each conversation between users, and each message that is sends a key is created automatically and different from the previous ones. It should be noted that both algorithms are symmetric and the most used also contain a base code, so each company that wants to use it modifies it for their needs.
What is the problem with these algorithms? Why have they been violated? Today’s technology has a limit and the algorithms are not far behind. To begin with, they maintain a very high probability that secret keys can be repeated, this increases the possibility that a gross attack will be a total success and will break their security (which they have already done), on the other hand back doors have been obtained for which they have managed to enter to obtain the information that is safeguarded. This makes the algorithms predictable for anyone and have the data they want at hand. Now, while you read the article different hackers are preparing to carry out their attack and more loaded than the previous one, so you have to ask if the encryption technology they offer us today works? Or do we need something out of the ordinary?