Encryption
Encryption is the process of converting information into a code to prevent unauthorized access, often using cryptographic algorithms.
Encryption is the process of encoding information using an algorithm (a cipher) to make it unreadable to unauthorized parties. This process transforms plaintext (readable data) into ciphertext (unreadable data). Decryption is the reverse process, converting ciphertext back into plaintext using a specific key. There are two primary types of encryption: symmetric and asymmetric. Symmetric encryption uses the same secret key for both encryption and decryption, making it very fast and efficient, suitable for encrypting large amounts of data. However, securely sharing the secret key between parties can be challenging. Asymmetric encryption, also known as [public-key cryptography](/en/terms/public-key-cryptography), uses a pair of keys: a public key for encryption and a private key for decryption. The public key can be shared freely, while the private key must be kept secret. This allows for secure communication without pre-shared secrets and is fundamental to digital signatures and secure key exchange protocols like TLS/SSL. Encryption is a cornerstone of modern cybersecurity, protecting data confidentiality across networks, in storage, and during transmission.
graph LR
Center["Encryption"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Center --> Child_symmetric_encryption["symmetric-encryption"]:::child
click Child_symmetric_encryption "/terms/symmetric-encryption"
Center --> Child_asymmetric_encryption["asymmetric-encryption"]:::child
click Child_asymmetric_encryption "/terms/asymmetric-encryption"
Center --> Child_tls_ssl["tls-ssl"]:::child
click Child_tls_ssl "/terms/tls-ssl"
Rel_decryption["decryption"]:::related -.-> Center
click Rel_decryption "/terms/decryption"
Rel_cybersecurity["cybersecurity"]:::related -.-> Center
click Rel_cybersecurity "/terms/cybersecurity"
Rel_data_privacy["data-privacy"]:::related -.-> Center
click Rel_data_privacy "/terms/data-privacy"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explain Like I'm 5
It's like writing a secret message in a code that only your friend can understand. Even if someone steals the letter, they won't be able to read what's inside.
🤓 Expert Deep Dive
Cryptographic encryption relies on mathematical principles to ensure confidentiality. Symmetric encryption algorithms, such as AES (Advanced Encryption Standard), employ block ciphers or stream ciphers operating on fixed-size blocks or continuous streams of data, respectively. Key lengths (e.g., 128, 192, 256 bits for AES) determine the theoretical security against brute-force attacks. Asymmetric encryption, exemplified by RSA and Elliptic Curve Cryptography (ECC), leverages number-theoretic problems (e.g., integer factorization, discrete logarithm problem) to establish secure communication channels. [Public Key Infrastructure](/en/terms/public-key-infrastructure) (PKI) systems manage the distribution and verification of public keys through certificates. Hybrid encryption schemes combine the efficiency of symmetric encryption for bulk data with the key management capabilities of asymmetric encryption (e.g., TLS handshake). Vulnerabilities often arise not from the algorithms themselves but from implementation flaws, weak key management, side-channel attacks, or advances in cryptanalysis (e.g., quantum computing threats).