There are various algorithms used to encrypt data and keep it secure. Companies that offer online file storage are likely to use one of these algorithms to safely store their customers’ data in the cloud. The three most popular encryption algorithms are all symmetric key algorithms; this means both the encryption and decryption depend on the same key. But the similarities end there. Here are some differences.
DES – DES was designed for hardware. It accepts a 56-bit key (this is a bit shorter than what IT professionals are used to these days). Providers who use often use DES use triple-DES instead of single, in order to encrypt 64 bits of data at a time and do the job a little bit faster. Because it was designed for hardware, it tends to be slower in software.
AES –Users appreciate the versatility of AES because it accepts a 128-, 192- or 256-bit key. One distinction is that AES sometimes causes encrypted messages to be slightly longer than they otherwise would be; however, it also increases resistance to some theoretical attacks in scenarios where a large quantity of data is being encrypted. For cloud file sharing services, AES offers the advantage of being fast in both hardware and software.
Blowfish –Blowfish may have a slower startup time, but it is actually quite fast after the initial setup is complete. It accepts a whopping 448 bits, and encrypts 128 bits of data at a time – that’s exactly twice as much as triple DES. Because it was designed for software, it tends to be slower in hardware; but for customers of an online file storage service, this detail is irrelevant. What should matter to them is that Blowfish is an outstanding data encryption tool, particularly for its massive, 448-bit encryption. In fact, this superior level of encryption has been called “overkill.” Now that’s secure!
drive2go offers 448-bit encryption, and the assurance that there is no risk of compromised security with our private key cloud storage. Unlike consumer cloud products like Dropbox, Google Drive, Microsoft SkyDrive and SugarSync, which are hosted publicly and rely on shared encryption keys, we provide a private encryption key that only grants access to its owner. This detail is far more important than the algorithm.