• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Encryption and Decryption in Technology

By Abhishek Ghosh April 23, 2012 5:28 pm Updated on April 23, 2012

Encryption and Decryption in Technology

Advertisement

Encryption is process by which one makes a digital document unreadable to anyone who does not have the key that has been used to Encrypt. Decryption is the proper way to reverse the process of Encryption to make it human readable. Previously we wrote about How to Encrypt Decrypt any file or folder from right click context menu in Windows 7.

 

Why we need to do Encryption

 

Although encryption can work fine for a secret document, other cryptographic techniques are also needed to communicate securely. To check the integrity or the authenticity of a document, using respectively a Message Authentication Code (MAC) or a digital signature we also use Encryption. The security of an encryption system must be based on the secret encryption key, not that of the algorithm. Kerckhoffs’s principle assumes that the enemy (or the person who wants to know the encrypted message illegally) knows the algorithm used.

 

Encryption

 

Two main types of encryption methods are :

Advertisement

---

 

  • Symmetrical : When it uses the same key to encrypt and decrypt.
  • Asymmetrical : When using different pair of keys – a public key used for encryption and a private key for decrypting.

 

The best known methods are OF, Triple DES and AES for symmetric cryptography and RSA for asymmetric encryption. The use of symmetric or asymmetric depends on the situation. Asymmetric cryptography / Encryption has two major advantages: it eliminates the problem of secure transmission of the key and allows the electronic signature. It does not replace the symmetric systems because its computation time is significantly longer.

 

More on Encryption and Decryption

 

Encoding and Encryption are not the same things. The essential difference between Encryption and Encoding lies in the desire to protect information and prevent third parties from accessing data in the case of encryption. Encryption is to transform coding of information (data) to a set of words. Every word is made up of symbols. Encoding is an compression, it transforms the data to a set of words adequate to reduce the size but there is no desire to conceal (although this is done implicitly by making it harder to access the content) the data.

 

Tagged With encryption decryption logo , icon decrypt
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Encryption and Decryption in Technology

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • Encrypt Decrypt any file or folder from right click context menu in Windows 7

    You can add Encrypt or Decrypt option in Windows 7 right click context menu. Thus any file or folder can be Encrypted or Decrypted on single click.Here is how you can do it.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • What is Military-Grade Encryption in VPN Service

    Military-grade is AES-256 with 2048 DH for the VPN. AES-256-GCM is the too big hammer, far away from probability to be compromised.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Market Segmentation in BriefSeptember 20, 2023
  • What is Booting?September 18, 2023
  • What is ncurses?September 16, 2023
  • What is JTAG in Electronics?September 15, 2023
  • iPhone 15 Pro Max Vs Samsung Galaxy S22/S23 UltraSeptember 14, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy