0% found this document useful (0 votes)
13 views4 pages

Encryption Decryptiin

Uploaded by

SAHIL RAJPUT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Encryption Decryptiin

Uploaded by

SAHIL RAJPUT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Before, we understand

first understand Encryption vs. Decryption let's

What is Cryptography?
Cryptography is used to secure and protect data during
communication. It is helpful to prevent unauthorized
person or group of users from accessing any
data. Encryption and decryption are the two confidential
functionalities of cryptography. essential
A message sent over the
network is transformed into an
as data encryption. At the unrecognizable encrypted message known
receiving end,the receivedmessage
known as decryption. is converted to its
original form

Table of Content:

What is meant By Encryption?


Encryption is a process which transforms the original
new form of the message is entirely information intoan unrecognizable form. This
different
able to read the data as senders use an from the original message.That's why a
encryption hacker isnot
algorithms. algorithm. Encryption is usually done using key
Data is encrypted to make it safe from
to keep their trade secret from their stealing. However, many known companies also encrypt data
competitors.

Encryption +

Plain Text
Algorithm Cipher Text
Encryption Process

What is meant by Decryption?


Decryption is aprocess of converting encoded/encrypted data in a form that is
understood by a human or a computer. This method is performed by readable and
manually or byusing keys used to encrypt the original data. un-encrypting the text
Decryption
Cipher Text Algorithm Plain Text

Decryption process

KEY DIFFERENCE

Encryption is a process of converting normal data into an unreadable form whereas


Decryption is amethod of converting the unreadable/coded data into its original form.
" Encryption is done by the person who is sending the data to the destination, but the
decryptionisdone at the person who is receiving the data.
" The same algorithm with the same key is used for both the encryption-decryption
processes.

Why use Encryption and Decryption?


Here, are important reasons for using encryption:

EXPLORE MORE

Learn Java Programming


with Beginners Tutorial
08:32

Linux Tutorial for


Beginners: Introduction

3504

" Helps youto protect your confidential data such as passwords and login id
" Provides confidentiality of private information
" Helps you to ensure that that the document or file has not been altered
Encryption process also prevents plagiarism and protects IP
" Helpful for network communication (like the internet) and where a hacker can easily access
unencrypted data.
" It is an essential method as it helps you tosecurely protect data that you don't want anyone
else to have access.

Types of Keys
SymmetricKey
Symmetric-key encryption are algorithms which use the same cryptographic keys for both
encryption of plaintext and decryption of ciphertext.
Asymmetric Key
Asymmetric encryption uses 2 pairs of key for encryption. Public key is available to anyone while
the secret key is only made available to the receiver of the message. This boots security.

Public Key
keys
Public key cryptography is an encryption system which is basedon twopairs of keys. Public
are used to encrypt messages for areceiver.

Private Key
Private key may be part of a public/ private asymmetric key pair. It can be used in asymmetric
encryption as you can use the same key to encrypt and decrypt data.

Pre-Shared Key
between the
In cryptography,a pre-shared key (PSK) is asharedsecret which was earlier shared
two parties using a secure channel before it is used.

hey: Replace every letter with 3rd successive letter


I LOVEAPPLES
1JK ABE STU
1 2 3 1 2 3 1 2 3

Cipher KNQYG CRRNGU

Difference between Encryption andDecryption

Vs Decryptiom

Difference between Encryption and Decryption

Parameter Encryption Decryption


Itis a process of converting normal It is amethod of converting the
What is data into an unreadable form. It helps unreadable/codeddata into its orignal
you to avoid any unauthorized access form.
todata
Parameter Encryption Decryption
Whenever the data is sent between The receiver of the data automatically
Process hines, it is encrypted
two separate machines, allows you to convert the data from the
allows
automatically using asecret key. codes intoits original form.
Location of The person who is sending the data to The receiver receives the data and
Conversion the destination. Converts it.

An employee is sending essential The manager is receiving the essential


Example
documents to his/her manager. documents from his/her employee.
The only single algorithm is used for
Use of The same algorithm with the same key encryption and decryption with a pair of
isused for the encryption-decryption
Algorithm keys where each use for encryption and
procesS.
decryption.
Transforming humanly understandable It isa conversion of an obscure message
Major messages into an incomprehensible into an understandable form which is
function and obsCure form that can not be
easy to understand by a huma
interpreted.

Summary
Cryptography is used to secure and protect data during communication.
Encryption is aprocess which transforms the original information into an unrecognizable form.
Decryptionis a process ofconverting encoded/encrypted data in aform that is readable and
understood by a human or a computer.
Encryption methodhelps you to protect your confidential data such as passwords and login id.
" Public, Private, Pre-Shared and Symmetric are important keys used in cryptography.
" An employee is sending essential documentsto his/her manager is anexample of an
encryption method.
" The manager is receiving the essentialencrypted documents from his/her employee and
decrypting it isan example of a decryption method.

You might also like