Skip to main content

What is encryption? Explain types of Encryption with alogorithm

Encryption :


Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting plaintext to ciphertext. In simpler terms, encryption takes readable data and alters it so that it appears random. Encryption requires the use of an encryption key: a set of mathematical values that both the sender and the recipient of an encrypted message know.


Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography.



What are the different types of encryption?


There are two main kinds of encryption are symmetric encryption and asymmetric encryption.


Asymmetric encryption is also known as public key encryption.


In symmetric encryption, there is only one key, and all communicating parties use the same key for encryption and decryption. In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption. Either key can be used for either action, but data encrypted with the first key can only be decrypted with the second key, and vice versa. One key is kept private, while one key is shared publicly, for anyone to use – hence the "public key" name. Asymmetric encryption is a foundational technology for SSL (TLS).


Symmetric Encryption


  • It only requires a single key for both encryption and decryption.

  • The size of cipher text is same or smaller than the original plain text.

  • The encryption process is very fast.

  • It is used when a large amount of data is required to transfer.

  • It only provides confidentiality.

  • Examples: 3DES, AES, DES and RC4

  • In symmetric key encryption, resource utilization is low as compared to asymmetric key encryption.


Asymmetric Encryption


  • It requires two key one to encrypt and the other one to decrypt.

  • The size of cipher text is same or larger than the original plain text.

  • The encryption process is slow.

  • It is used to transfer small amount of data.

  • It provides confidentiality, authenticity and non-repudiation.

  • Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA

  • In asymmetric key encryption, resource utilization is high.


What is an encryption algorithm?


An encryption algorithm is the mathematical formula used to transform data into ciphertext. An algorithm will use the key in order to alter the data in a predictable way, so that even though the encrypted data will appear random, it can be turned back into plaintext by using the key again.


Comments

Post a Comment

Popular posts from this blog

How to Reset Steam Password? – Recover Your Steam Password

Are you suffering with Reset Steam Password? This blog will help you. What is Steam? Steam is the online website for getting the best games for paid. If you are a true game lover then you should have an active account on Steam. Many of people lost their password during the  PC clean-up  or any other circumstances. At that time they have to reset Password of all accounts. Then if you facing issues with the password, you forced to Steam reset password to access the Steam account. We are going to share the guide that how to recover your forgotten Steam Password and make your existing account ready. First of all, you should have enough knowledge about what is Steam and why Steam Account required? Why Steam Account Requires? Before jump into password recovery and Login details, let me clear about why Steam Account required? There are several benefits of this Steam Account from where you can easily download PC games as well as software. Though it will be p...

What is STP? - Explain Advantages and Disadvantages

The Spanning Tree Protocol is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. STP is a protocol. It actively monitors all links of the network. To finds a redundant link, it uses an algorithm, known as the STA (spanning-tree algorithm). The STA algorithm first creates a topology database then it finds and disables the redundant links. Once redundant links are disabled, only the STP-chosen links remain active. If a new link is added or an existing link is removed, the STP re-runs the STA algorithm and re-adjusts all links to reflect the change. STP (Spanning Tree Protocol) automatically removes layer 2 switching loops by shutting down the redundant links. A redundant link is an additional link between two switches. A redundant link is usually created for backup purposes. Just like every coin has two sides, a redundant link, along with...