What are different types of encryption?

Encryption

is a process of converting data from a normal, readable state, called plaintext , in protected, secure data called cifhertext so that only the intended recipients or recipients who can decrypt them with a secret key. Encryption is a practice reaching back to the ancient war when it was important to send messages that enemies could not access. There are many types of encryption that can be categorized in several ways: encryption material, encryption means, encryption methodology, including a specific algorithm and/or recently or recently invented/used encryption systems. E -mail encryption applies to all outgoing e -mail from the system. Hard disk encryption - also known as an encryption with full FDE, encryption, hard disk encryption, or disk encryption - encrypts all files of all kinds found on your computer's hard disk. HTTPS Pages encrypt all transactions performedé through them, allowing credit card payments over the Internet. For example, the user may decide to ensure a specific PDF and - - depending on the software program used - requires the password to open and/or change or prevent any adjustment or restriction or forbidding.

encryption types can also be distinguished by encrypting software or hardware -based encryption. For example, hard disk encryption was primarily performed by software. However, a group of hard disk manufacturers, which form a trusted computer (TCG) group, however, agreed in 2009 on an encryption standard for hard drives, which named the specifics of TCGion storage. After full acceptance, hard drives are automatically encrypted than need a separate added software program to achieve this goal.

Another way to distinguish types of encryption is how they work. MetOdika encryption can be symmetrical, which means that they have the only key that is used both for encryption and decrypting and which must be sent along with the message to ensure that it can be decrypted. On the other hand, this can be used asymmetric, in this case the sender uses the public key to the recipient to encrypt the simple text, and the recipient's computer uses the recipient's private key to decrypt it. Other distinguishing factors are the use of different algorithms, different keys and a block of ciphers or streaming ciphers. You could also distinguish types of encryption, which are considered obsolete - such as DES (data encryption standard) and WEP (cable equivalent to privacy), from newer, better encryption - such as Triple des and WAP2 (WiFi protected Access, version 2) using AES (advanced encryption standard).

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?