DDOS, cold boot attacks, and quantum keys - here's how people protect and intercept data

Advertisement

Ever since humans began sending messages to each other, dubious efforts have been made to intercept them.

Advertisement

Advertisement

Whether these messages were sent via snail mail or through an outdated Turing machine, a wide array of groups and countries have plenty to gain or lose by either intercepting them, or by failing to employ sufficient methods to protect them.

The following infographic from the New Jersey Institute of Technology goes through a brief history of encryption methods, from the telegraph to the more advanced method of Advanced Encryption Standard (AES), along with several prominent issues plaguing these services.

NOW WATCH: Hackers can take over an entire network with this tiny $35 box