How do the encryption algorithms Rijndael and BlowFish work?
It can be dangerous to try and transport strictly confidential information to a secure place without unauthorized persons having acces to it. For centuries people have always tried to create cryptographic languages that could not be decoded easily. From the ancient Rome to the Second World War until today, heads of state and other powerful persons have spread orders and important information encoded to mislead enemies or to keep information away from unauthorized persons. Unfortunately, these encryption methods could always be decoded easily. For example, cryptographic languages created by moving letters (e.g. today is a nice day = tod ayi sani ced ay) could be detected easily. The problem with all, even the most elaborate cryptographic languages is that once the cipher has been found out, every text can be ’translated’. With the use of computers it has become impossible to keep secret a cipher created by moving letters. Today the use of different encryption methods has become necessar