Indian Company Master Data Made Simple

Skip to main content

Encryption

3 min read

Quick Summary

Encryption converts plaintext into ciphertext using algorithms and keys, ensuring data remains secure even if intercepted.

Encryption is the process of converting information or data into a code to prevent unauthorized access. It is a fundamental component of data security, protecting sensitive information as it travels across networks or sits in storage.

Types of Encryption

Type Description Use Case
Symmetric Same key for encryption and decryption Fast data encryption (AES)
Asymmetric Public and private key pair Secure communications (RSA)
Hashing One-way function, irreversible Password storage (SHA-256)

Common Encryption Algorithms

  • AES (Advanced Encryption Standard): Symmetric, widely used
  • RSA: Asymmetric, used for secure data transmission
  • Triple DES: Legacy symmetric encryption
  • Blowfish: Fast symmetric block cipher
  • SHA-256: Hashing algorithm

Encryption in Transit vs At Rest

Type When Applied Example
In Transit Data moving across networks HTTPS, VPN
At Rest Stored data Encrypted databases, disk encryption

Applications of Encryption

  • Secure web browsing (HTTPS/SSL/TLS)
  • Email security (PGP, S/MIME)
  • Mobile device security
  • Cloud storage protection
  • Financial transactions
  • Virtual Private Networks (VPN)

Key Points

  • Converts data to secure code
  • Symmetric and asymmetric types
  • AES and RSA common algorithms
  • Protects data in transit and at rest
  • HTTPS uses encryption
  • Key management critical

Frequently Asked Questions

Is encryption breakable?

What is end-to-end encryption?