Encryption is the process of making data more secure by using an algorithm to encrypt the data so it cannot be accessed, read, or used without a corresponding decryption key. Encryption is used to protect sensitive information.

Terms related to Encryption: Decryption, Https, Vulnerability, Data, Authentication, Multi-Factor Authentication, Cybersecurity, Privacy, SSL, Key, Symmetric, Asymmetric, RSA, Algorithm. Plaintext, Ciphertext.

Encryption is a vital technique for protecting data from unauthorized access, whether it is “at rest” (located on a particular server) or “in transit” (being transmitted across internal or external networks). Encryption is used across many technologies and devices including desktop and laptop computers, servers, local and cloud-based infrastructure, and mobile devices.

Encryption is typically used over the internet to protect sensitive information when it is being transmitted and received. This can include passwords, login details, payment details, identity information, biometric authentication, security tokens, and much more. The Https web protocol, Secure Socket Layer (SSL) certificates, Transport Layer Security (TLS) and other secure data frameworks and protocols all use encryption.

Encryption is normally carried out by an algorithm that takes data and uses an “encryption key,” together with various techniques to scramble the data so it is completely unreadable. When the data arrives at its destination, another algorithm uses a “decryption key” to make the information readable again.

Popular encryption key algorithms and techniques include the RSA encryption algorithm, public key encryption, symmetric encryption, asymmetric encryption, and digital signatures. Encryption can also use techniques like “Hashing” and “Salting” to provide a deeper level of security for very sensitive information.

Encryption Resources from Crossmatch