In previous pages ive shown the technical intricasies of these beutiful algorithms themselves. Now I want to comment on the intricate ways by which encryption is used, both incredibly simple and undeniably complex encryption algorithms have become integral to nearly every part of our daily digital lives. well First and most common encryption algorithms are used whenever we communicate digitaly, preventing criminals from stealing our data. Encryption algorithms can also be used to prevent criminals from empersonating us, just like in the previously mentioned scytale algorithm as a logical product of one parties ability to translate the encrypted tet they know the identity of the other party as true, as if it wasnt true then very simply the text couldnt be translated legibly, This is the second super power of encryption one that we all use and benefit from when paying, talking and viewing anything digitally our identities could be impersonated till kingdom come without these amazing algorithms protecting our very identity online.

This all assumes the algorithms themselves cannot be broken, although this is true with traditional computing architectures new technologies like qunatum computers could bring a end to all encryption algorithms, this near apocoliptic event is one our society needs to trully fear and plan accordingly.