Data Encryption : Data encryption is the act of changing electronic information into an
unreadable state by using algorithms or ciphers. Originally, data
encryption was used for passing government and military information
electronically. Over time as the public has begun to enter and transmit
personal, sensitive information over the internet, data encryption has
become more widespread. Nowadays web browsers will automatically encrypt
text when connecting to a secure server. You can tell you are on a
secure, encrypted website when the URL begins with "https", meaning
Hypertext Transmission Protocol, Secure.
There are three basic encryption methods: hashing, symmetric
cryptography,
and asymmetric cryptography. Hashing, for example, is
very resistant to tampering, but is not as flexible as the other
methods. All three forms of encryption rely on cryptography, or the
science of scrambling data.
Hashing Encryption :
The first encryption method, called hashing, creates a unique,
fixed-length signature for a message or data set. Hashes are created
with an
algorithm, or
hash function,
and people commonly use them to compare sets of data. Since a hash is
unique to a specific message, even minor changes to that message result
in a dramatically different hash, thereby alerting a user to potential
tampering.
Symmetric Methods :
Symmetric cryptography, also called private-key cryptography, is one
of the oldest and most secure encryption methods. The term "private
key" comes from the fact that the key used to
encrypt and decrypt data must remain secure because anyone with access to it
can read the coded messages.
Asymmetric Forms :
Asymmetric, or public key, cryptography is, potentially, more secure
than symmetric methods of encryption. This type of cryptography uses
two keys, a "private" key and a "public key," to perform encryption and
decryption.
If You want to learn about the technology, computer science & engineering, web programming, freelancing, earning please click here :
CSE SOLVE