0% found this document useful (0 votes)
1 views

What Is Encryption

What is encryption

Uploaded by

Megha basvaraju
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

What Is Encryption

What is encryption

Uploaded by

Megha basvaraju
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

What is encryption?

Encryption is a way of scrambling data so that only authorized parties can


understand the information. In technical terms, it is the process of
converting human-readable plaintext to incomprehensible text, also
known as ciphertext. In simpler terms, encryption takes readable data and
alters it so that it appears random. Encryption requires the use of
a cryptographic key: a set of mathematical values that both the sender
and the recipient of an encrypted message agree on.

Although encrypted data appears random, encryption proceeds in a


logical, predictable way, allowing a party that receives the encrypted data
and possesses the right key to decrypt the data, turning it back into
plaintext. Truly secure encryption will use keys complex enough that a
third party is highly unlikely to decrypt or break the ciphertext by brute
force — in other words, by guessing the key.

What are the different types of


encryption?
The two main kinds of encryption are symmetric encryption
and asymmetric encryption. Asymmetric encryption is also known
as public key encryption.
In symmetric encryption, there is only one key, and all communicating
parties use the same (secret) key for both encryption and decryption. In
asymmetric, or public key, encryption, there are two keys: one key is used
for encryption, and a different key is used for decryption. The decryption
key is kept private (hence the "private key" name), while the encryption
key is shared publicly, for anyone to use (hence the "public key" name).
Asymmetric encryption is a foundational technology for TLS (often
called SSL)
Encryption Algorithms
Triple DES Encryption
Triple DES was designed to replace the original Data Encryption Standard
(DES) algorithm, which hackers learned to defeat with ease. At one time,
Triple DES was the recommended standard and the most widely used
symmetric algorithm in the industry.
Triple DES uses three individual keys with 56 bits each. The total key
length adds up to 168 bits, but experts say that 112-bits in key strength is
more like it.
Though it is slowly being phased out, Triple DES is still a dependable
hardware encryption solution for financial services and other industries.
RSA Encryption
RSA is a public-key encryption algorithm and the standard for encrypting
data sent over the internet. It also happens to be one of the methods used
in PGP and GPG programs.
Unlike Triple DES, RSA is considered an asymmetric encryption algorithm
because it uses a pair of keys. The public key is used to encrypt a
message and a private key to decrypt it. It takes attackers quite a bit of
time and processing power to break this encryption code.
Advanced Encryption Standards (AES)
The Advanced Encryption Standard (AES) is the algorithm trusted as the
standard by the U.S. government and many other organizations.
Although it is extremely efficient in 128-bit form, AES encryption also uses
keys of 192 and 256 bits for heavy-duty encryption.
AES is considered resistant to all attacks, with the exception of brute-force
attacks, which attempt to decipher messages using all possible
combinations in the 128-, 192- or 256-bit cipher. Still, security experts
believe that AES will eventually become the standard for encrypting data
in the private sector.

You might also like