Encryption :
Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting plaintext to ciphertext. In simpler terms, encryption takes readable data and alters it so that it appears random. Encryption requires the use of an encryption key: a set of mathematical values that both the sender and the recipient of an encrypted message know.
Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography.
What are the different types of encryption?
There are two main kinds of encryption are symmetric encryption and asymmetric encryption.
Asymmetric encryption is also known as public key encryption.
In symmetric encryption, there is only one key, and all communicating parties use the same key for encryption and decryption. In asymmetric, or public key, encryption, there are two keys: one key is used for encryption, and a different key is used for decryption. Either key can be used for either action, but data encrypted with the first key can only be decrypted with the second key, and vice versa. One key is kept private, while one key is shared publicly, for anyone to use – hence the "public key" name. Asymmetric encryption is a foundational technology for SSL (TLS).
Symmetric Encryption
It only requires a single key for both encryption and decryption.
The size of cipher text is same or smaller than the original plain text.
The encryption process is very fast.
It is used when a large amount of data is required to transfer.
It only provides confidentiality.
Examples: 3DES, AES, DES and RC4
In symmetric key encryption, resource utilization is low as compared to asymmetric key encryption.
Asymmetric Encryption
It requires two key one to encrypt and the other one to decrypt.
The size of cipher text is same or larger than the original plain text.
The encryption process is slow.
It is used to transfer small amount of data.
It provides confidentiality, authenticity and non-repudiation.
Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA
In asymmetric key encryption, resource utilization is high.
ReplyDeleteAwesome blog. Thanks for sharing such a worthy information....
Data science course in Delhi
Data Science Course in Gurgaon