Quick Summary
Encryption converts plaintext into ciphertext using algorithms and keys, ensuring data remains secure even if intercepted.
Encryption is the process of converting information or data into a code to prevent unauthorized access. It is a fundamental component of data security, protecting sensitive information as it travels across networks or sits in storage.
Types of Encryption
| Type | Description | Use Case |
|---|---|---|
| Symmetric | Same key for encryption and decryption | Fast data encryption (AES) |
| Asymmetric | Public and private key pair | Secure communications (RSA) |
| Hashing | One-way function, irreversible | Password storage (SHA-256) |
Common Encryption Algorithms
- AES (Advanced Encryption Standard): Symmetric, widely used
- RSA: Asymmetric, used for secure data transmission
- Triple DES: Legacy symmetric encryption
- Blowfish: Fast symmetric block cipher
- SHA-256: Hashing algorithm
Encryption in Transit vs At Rest
| Type | When Applied | Example |
|---|---|---|
| In Transit | Data moving across networks | HTTPS, VPN |
| At Rest | Stored data | Encrypted databases, disk encryption |
Applications of Encryption
- Secure web browsing (HTTPS/SSL/TLS)
- Email security (PGP, S/MIME)
- Mobile device security
- Cloud storage protection
- Financial transactions
- Virtual Private Networks (VPN)
Key Points
- Converts data to secure code
- Symmetric and asymmetric types
- AES and RSA common algorithms
- Protects data in transit and at rest
- HTTPS uses encryption
- Key management critical