Encryption
Encryption
computer) with the key can decode it. It converts a plaintext message into cipher
text (The resulting encrypted message produced by a cipher algorithm), which can
be decoded back into the original message. An encryption algorithm along with key
(asymmetric key: a public-key and a private-key) is used in the encryption and
decryption of data.
The type and length of the keys utilized depend upon the encryption algorithm and the
amount of security needed. In conventional symmetric encryption a single key is
used. With this key, the sender can encrypt a message and a recipient can decrypt
the message but the security of the key becomes problematic. In asymmetric
encryption, the encryption key and the decryption key are different. One is a public
key by which the sender can encrypt the message and the other is a private key by
which a recipient can decrypt the message.
How It Works:
A writes a message for B. In order to make sure that only B can look at this message, A
encrypts it using B’s Public Key.
B receives the message sent by A. In order for him to see what A put in his message, B
decrypts it using his private key.