• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Basics of Encryption – Encrypt, Keys, Decrypt and Deciphering

By Abhishek Ghosh April 16, 2024 5:27 am Updated on April 16, 2024

Basics of Encryption – Encrypt, Keys, Decrypt and Deciphering

Advertisement

Encryption is the conversion of information, called plaintext, into a ciphertext (also called cipher or keytext). A secret key is used, which may only be known to authorized persons. With knowledge of the key, the ciphertext can be converted back into the plaintext, which is called decryption.

Encryption is used to maintain the secrecy of information, for example in order to be able to transmit military messages secretly or to protect written messages or stored data against unauthorized “reading”. The science of “secret writing” is called cryptography, derived from ancient Greek κρυπτός kryptós. Its origins lie in antiquity, possibly even further, because secrecy has always been an important concern for humans.

In the modern era, the need for encryption methods that are easy to use and at the same time sufficiently secure increased due to the invention of telegraphy, especially radio telegraphy, and the hard disk drive (HD) for computers. Until the end of the 19th century, almost only manual methods were known for encryption – apart from simple devices such as encryption disks. With the introduction of the electric typewriter and the teletype at the beginning of the 20th century, more and more machine methods for encryption came into use, such as rotor cipher machines. These promised easier handling and improved cryptographic security. Today, encryption is usually done with the help of encryption software or dedicated hardware.

Advertisement

---

Basics of Encryption - Encrypt Keys Decrypt and Deciphering

 

Encrypt, Keys, Decrypt and Deciphering

 

Encrypt

By encrypting, the original “open wording” of a text, the “plaintext”, is converted into an incomprehensible string of characters, the “ciphertext”. The technical terms plaintext and ciphertext have grown historically and can be interpreted much more broadly today. In addition to text messages, all other types of information can be encrypted, such as voice messages, images, videos or the source code of computer programs. The cryptographic principles remain the same.

Keys

The crucial parameter in encryption is the “key”. The good choice of a key and its secrecy are important prerequisites for keeping the secret. In the case of encoding, the codebook represents the key. In the case of most classical and also some modern methods of encryption, it is a password (also: password, keyword, code word or code word, solution, password or slogan from Italian la parola “the word”; English password). In many modern methods, such as e-mail encryption, the user is now relieved of the choice of a key. This is automatically generated without the user noticing. This also eliminates the “human factor”, namely the often too careless choice of an insecure password – because it is too short and easy to guess.

Decrypt

The reverse step to encryption is decryption. The authorized recipient, the “decryptor”, recovers the plaintext from the ciphertext using the secret key known to him. In the case of symmetric encryption methods, which have been known only for a long time, this is identical to that used by the encryptor. The decryption process, on the other hand, is usually similar, but not necessarily identical to the encryption. If it does, as in the case of the German key machine “Enigma” from the Second World War, then it is called involutional encryption.

The key is agreed in advance between the two communication partners, for example by means of a secret key board that both have, or in another secret way, for example by courier. In modern asymmetric methods, there are two different keys, one for encryption (“public key”) and another needed for decryption (“private key”). If the private key is lost, the ciphertext can no longer be decrypted. If the key falls into the hands of a stranger, third parties can also read the ciphertext, so the secret is no longer kept.

Deciphering

Linguistically separate from decryption is the concept of “decipherment”. Decipherment is the art of extracting the secret message from the ciphertext without being in possession of the key. This is the job of a cryptanalyst, often referred to as a “codebreaker”. Ideally, it will not be possible to decipher because the encryption method is sufficiently “strong”. It is then referred to as “unbreakable” or at least “cryptographically strong”. In contrast to “strong encryption”, “weak encryption” can be broken with reasonable effort using cryptanalytic methods without prior knowledge of the key.

The field of work that deals with the deciphering of ciphertexts is cryptanalysis. In addition to cryptography, it is the second subfield of cryptology. Cryptanalysis is not only used for the unauthorized decipherment of secret messages, but also deals with the “(un)breakability” of encryptions, i.e. the testing of the security of encryption methods against unauthorized decipherment.

Most encryption methods are pragmatically secure at best, which means that no practical way to decipher them has been found in their cryptanalysis. The longer a method has been publicly known and the more widespread it is in use, the more confidence can be placed in security, because it can be assumed that many capable cryptologists have examined it independently of each other and that any weakness that may exist would have been found and published.

There are methods whose safety can be proven assuming the validity of certain mathematical conjectures. For example, for the RSA cryptosystem, it can be shown that a user’s private key can be efficiently computed from their public key if and only if a large number (on the order of a few hundred decimal places) can be efficiently decomposed into its prime factors.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Basics of Encryption – Encrypt, Keys, Decrypt and Deciphering

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

  • PHP Snippet to Hide AdSense Unit on WordPress 404 Page

    Here is Easy PHP Snippet to Hide AdSense Unit on WordPress 404 Page to Avoid Policy Violation and Decrease False Impression, False Low CTR.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy