Encryption

Encryption Definition

Encryption Example

Plain Text 
Encryption Algorithm
Encryption
Key
Cipher Key

Encryption Example Elaboration

The general idea is really simple.

This same process can be applied in reverse for Decryption.

This cipher key must be kept secure, because if it's lost, you can't decrypt your data. Encryption is necessary for multiple states of data, at rest (think on a hard drive), in transit (over the internet), and in use (in an active program).

Symmetric Vs Asymmetric Encryption

There are two main types of encryption:

Symmetric Encryption

Symmetric Encryption

Symmetric Encryption Definition
  • [i] Symmetric Encryption) - (definition:: Encryption that uses a single, shared key for both encryption and decryption) - (subject:: Cybersecurity

Symmetric Encryption Example

This would be the example shown where the same key is shared between the communicating parties. Examples are Advanced Encryption Standard (AES), the Data Encryption Standard (DES), and Blowfish Cipher.

In comparison to Asymmetric Encryption, symmetric encryption is usually faster, but it can be difficult to share the key with both parties securely.

Asymmetric Encryption

Asymmetric Encryption

Asymmetric Encryption Definition
  • [i] Asymmetric Encryption) - (definition:: Encryption that uses two mathematically related keys, a public key for encryption and a private key for decryption) - (subject:: Cybersecurity

Asymmetric Encryption Example

Asymmetric encryption allows users to encrypt data without needing to share a secret key, so it solves the key-sharing problem of Symmetric Encryption at the cost of higher computational cost. Examples include Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC).

Encryption Implementation

Encryption can be implemented at various levels:

Which encryption level is necessary depends on the specific security requirements and performance needs of the organization and situation.