• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Encryption and Decryption in Technology

By Abhishek Ghosh April 23, 2012 5:28 pm Updated on April 23, 2012

Encryption and Decryption in Technology

Advertisement

Encryption is process by which one makes a digital document unreadable to anyone who does not have the key that has been used to Encrypt. Decryption is the proper way to reverse the process of Encryption to make it human readable. Previously we wrote about How to Encrypt Decrypt any file or folder from right click context menu in Windows 7.

 

Why we need to do Encryption

 

Although encryption can work fine for a secret document, other cryptographic techniques are also needed to communicate securely. To check the integrity or the authenticity of a document, using respectively a Message Authentication Code (MAC) or a digital signature we also use Encryption. The security of an encryption system must be based on the secret encryption key, not that of the algorithm. Kerckhoffs’s principle assumes that the enemy (or the person who wants to know the encrypted message illegally) knows the algorithm used.

 

Encryption

 

Two main types of encryption methods are :

Advertisement

---

 

  • Symmetrical : When it uses the same key to encrypt and decrypt.
  • Asymmetrical : When using different pair of keys – a public key used for encryption and a private key for decrypting.

 

The best known methods are OF, Triple DES and AES for symmetric cryptography and RSA for asymmetric encryption. The use of symmetric or asymmetric depends on the situation. Asymmetric cryptography / Encryption has two major advantages: it eliminates the problem of secure transmission of the key and allows the electronic signature. It does not replace the symmetric systems because its computation time is significantly longer.

 

More on Encryption and Decryption

 

Encoding and Encryption are not the same things. The essential difference between Encryption and Encoding lies in the desire to protect information and prevent third parties from accessing data in the case of encryption. Encryption is to transform coding of information (data) to a set of words. Every word is made up of symbols. Encoding is an compression, it transforms the data to a set of words adequate to reduce the size but there is no desire to conceal (although this is done implicitly by making it harder to access the content) the data.

 

Tagged With encryption decryption logo , icon decrypt

This Article Has Been Shared 470 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Encryption and Decryption in Technology

  • What are keyloggers, trojans and Backdoors?

    Here is a small article explaining the terms Keyloggers, Trojans and Backdoors to an average Microsoft Windows user.

  • Windows 7 and Mac OS X: which one is better?

    Microsoft and Apple compete with the new versions of their operating systems those launched two months apart. Thecustomizewindows presents an honest comparison after using both the operating system for more than one year.

  • Laptop Security: Do not leave home without it!

    Hundreds of thousands of laptops are lost or stolen each year. What if it unfortunately happens to you?

  • Registry Bloat-What they are?

    The term registry bloat means the Windows registry is filled up with obsolete or unnecessary data entries those are useless for Your Windows 7 PC.

  • Mac or Linux PC Will be your Next Computer

    Mac uses stable UNIX kernel with state of art hardware, where a cheap Computer can be assembled with Free UNIX like OS Linux.There is no point to buy Windows OS.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (20K Followers)
  • Twitter (4.9k Followers)
  • Facebook (5.8k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.2k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Software Modernization? January 21, 2021
  • Cloud Computing : Cybersecurity Tips for Small Business Owners January 20, 2021
  • Arduino : Independently Blink Multiple LED January 18, 2021
  • What is a Loosely Coupled System? January 17, 2021
  • How To Repack Installed Software on Debian/Ubuntu January 16, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Encryption and Decryption in Technology," in The Customize Windows, April 23, 2012, January 22, 2021, https://thecustomizewindows.com/2012/04/encryption-and-decryption-in-technology/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy