Encryption is an effective way of minimising the risks of using technology. Encryption involves encoding data that is being transmitted via a computer network or disk so that only the sender and the recipient can read the data.
Any kind of computerised data can, in theory, be encrypted. In practice, encryption is most often used when data is transmitted by email or on the internet.
Data is encrypted by the sender using a software program to 'scramble' or encipher data using a code 'locking key.' The recipient 'unscrambles' or deciphers the data by using the matching 'unlocking key,' which is unique to the recipient. Anyone who intercepts the message will simply see scrambled data that would make no sense without the necessary key.
There are different types of encryption, and different levels of complexity of encryption. As with any code, encryption can be broken given sufficient time and resources. The more sophisticated levels of encryption now available have made it very difficult to unscramble encrypted data.
A common form of encryption is the public key - private key cryptography system. This system uses two different keys to lock and unlock messages and files. The two keys are mathematically linked together. A person's public key is distributed to other users and is used to encrypt messages to that person. The person keeps the private key secret and uses it to decrypt messages sent with the public key.
Another element of encryption is authentication - the process of verifying that a file or message has not been altered in route from the sender to the recipient.
Data encryption has several uses for electoral purposes. Whenever sensitive data is sent over a public network, it is advisable to encrypt it. This is particularly important where personal information or voting data is sent over a network, especially by internet or email.
Encryption technology is a rapidly changing field. If you are considering encryption it would be advisable to consult an expert in encryption to ensure that the most up-to-date technology is used.