Encryption is the process of translating data into a secret format so that only authorized parties can understand the information. Plain text, or readable data that is not encrypted, is converted into cipher text, or scrambled data that is unreadable. Encryption takes readable data and alters it so it appears random. This is done to protect and secure the confidentiality of data transmitted through a network.

To read an encrypted file, the recipient must have access to a secret key or password that enables them to translate the information back to its original form. This process is called decryption.

Although it appears random, encryption requires the use of an encryption key. This key consists of a string of characters used in combination with an algorithm to transform the plain text into cipher text and vice versa. Each key is unique.

Types of encryption

There are two main types of encryption: Asymmetric (also known as public key cryptography) and symmetric. The biggest difference between the two is that symmetric encryption uses one key for both encryption and decryption, and asymmetric encryption uses a public key for encryption and a private key for decryption. Symmetric encryption is the simplest and most-used technique. While asymmetric encryption takes longer to execute because of the complex logic involved, it’s a better choice from a security standpoint.

Examples of encryption

  • Data Encryption Standard (DES): DES is a low-level encryption standard that was established by the United States government in 1977. DES uses a 56-bit key and uses the block cipher method, which breaks text into 64-bit blocks and encrypts them. Because of technological advances, DES is relatively obsolete for protecting sensitive data.
  • Triple DES: Triple DES runs DES encryption three times. It encrypts, decrypts, then once again encrypts data. It strengthens the original DES standard.
  • RSA algorithm: RSA stands for Rivest, Shamir, and Adelman the inventors of the technique. The algorithm is based on the assumption that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time.
  • Advanced Encryption Standard (AES): As of 2002, AES is the United States government standard, replacing DES. It works at multiple network layers simultaneously and is used worldwide.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

Text Abbreviations reviewed by Web Webster   From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Data Science Definition &...

Data science is an interdisciplinary study of data using advanced tools and techniques...

What is NFC Tag?

Near Field Communication Near field communication (NFC) is a protocol that allows two devices...

Gap Analysis

Gap analysis is the process of assessing and comparing the differences between actual...