0% found this document useful (0 votes)
77 views

Encryption

Encryption encodes information using an algorithm and key so that only those with the key can decode it, converting plaintext into ciphertext. There are symmetric algorithms that use a single shared key, and asymmetric algorithms that use public-private key pairs to encrypt with the public key and decrypt with the private key, allowing secure communication without sharing keys. Public-key encryption refers to a mechanism where the public key is widely distributed but the private key is kept secret.

Uploaded by

Manish Shankar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views

Encryption

Encryption encodes information using an algorithm and key so that only those with the key can decode it, converting plaintext into ciphertext. There are symmetric algorithms that use a single shared key, and asymmetric algorithms that use public-private key pairs to encrypt with the public key and decrypt with the private key, allowing secure communication without sharing keys. Public-key encryption refers to a mechanism where the public key is widely distributed but the private key is kept secret.

Uploaded by

Manish Shankar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Encryption is a process of encoding information in such a way that only the person (or

computer) with the key can decode it. It converts a plaintext message into cipher
text (The resulting encrypted message produced by a cipher algorithm), which can
be decoded back into the original message. An encryption algorithm along with key
(asymmetric key: a public-key and a private-key) is used in the encryption and
decryption of data.

The type and length of the keys utilized depend upon the encryption algorithm and the
amount of security needed. In conventional symmetric encryption a single key is
used. With this key, the sender can encrypt a message and a recipient can decrypt
the message but the security of the key becomes problematic. In asymmetric
encryption, the encryption key and the decryption key are different. One is a public
key by which the sender can encrypt the message and the other is a private key by
which a recipient can decrypt the message.

Public-key refers to a cryptographic mechanism. The public-key is made public and is


distributed widely and freely. The private-key is never distributed and must be kept
secret. Given a key pair, data encrypted with the public-key can only be decrypted
with its private key. Conversely, data encrypted with the private-key can only be
decrypted with its public key.

How It Works:

A writes a message for B. In order to make sure that only B can look at this message, A
encrypts it using B’s Public Key.
B receives the message sent by A. In order for him to see what A put in his message, B
decrypts it using his private key.

You might also like