What is Data Encryption?Types of Encryption

Data Encryption : Data encryption is the act of changing electronic information into an unreadable state by using algorithms or ciphers. Originally, data encryption was used for passing government and military information electronically. Over time as the public has begun to enter and transmit personal, sensitive information over the internet, data encryption has become more widespread. Nowadays web browsers will automatically encrypt text when connecting to a secure server. You can tell you are on a secure, encrypted website when the URL begins with "https", meaning Hypertext Transmission Protocol, Secure.


There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Hashing, for example, is very resistant to tampering, but is not as flexible as the other methods. All three forms of encryption rely on cryptography, or the science of scrambling data.

Hashing Encryption :

The first encryption method, called hashing, creates a unique, fixed-length signature for a message or data set. Hashes are created with an algorithm, or hash function, and people commonly use them to compare sets of data. Since a hash is unique to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering.

Symmetric Methods :

Symmetric cryptography, also called private-key cryptography, is one of the oldest and most secure encryption methods. The term "private key" comes from the fact that the key used to encrypt and decrypt data must remain secure because anyone with access to it can read the coded messages.

Asymmetric Forms :

Asymmetric, or public key, cryptography is, potentially, more secure than symmetric methods of encryption. This type of cryptography uses two keys, a "private" key and a "public key," to perform encryption and decryption.
If You want to learn about the technology, computer science & engineering, web programming, freelancing, earning please click here :CSE SOLVE

Post a Comment

Previous Post Next Post