
Overview of Encryption and Decryption
Encryption is a process of coding information which could either be a file or mail message into cipher text a form unreadable without a decoding key in order to prevent anyone except the intended recipient from reading that data. Decryption is the reverse process of converting encoded data to its original un-encoded form, plaintext. A key in cryptography is a long sequence of bits used by encryption / decryption algorithms. The following example to represents a hypothetical 40-bit key:
10101001 10011110 00011100 01010101
Types of Encryption
Depending on the type of encryption, information can be displayed as various numbers, letters, or symbols. Those who work in cryptography fields make it their job, to encrypt information or to break codes to receive encrypted information.
Manual Encryption
Manual encryption is a type that involves the use of encryption software. These are computer programs that encrypt various bits of information digitally. Manual encryption involves the user's participation completely. The files wants to encrypt are chosen, and then an encryption type is chosen from a list that the security system provides.
Transparent Encryption
Transparent encryption is another type of computer software
encryption. It can be downloaded onto a computer to encrypt
everything automatically. One of the most important secure
types of encryption available because it doesn't leave
anything that might be forgotten when using manual
encryption. Every executable application and file created in
the computer has an encrypted copy that can withstand power
surges and protects information in case a computer is stolen.
Symmetric Encryption
All encryption is done via a computer software program. You
can easily encrypt information by yourself. One of the
simplest ways to do this is through symmetric encryption.
Here, a letter or number coincides with another letter or
number in the encryption code. You can take any written text
and substitute letters and numbers for their coded counterpart,
thus encrypting the text.
Asymmetric Encryption
Asymmetric encryption is a secure and easy way that can be
used to encrypt data that you will be receiving. It is generally
done electronically. A public key is given out to whomever
you want or posted somewhere for the public to see. They can
encrypt information using the key and send it to you. This is
often done when writing emails. This means encrypt the data
with the public key, it can only be read again by whomever
the private key has.
Types of Decryption
Symmetric Decryption
In symmetric encryption, the same mathematical equation
both encrypts and decrypts the data. The following example,
a simple letter substitution cipher, such as A=B, B=C, etc., is
symmetrical because you simply reverse the process to
decrypt the message. If you send a message using a
symmetric encryption method, the recipients must also have
the key to decrypt the document.
Asymmetric Decryption
Asymmetric decryption methods, also known as public-key decryption, use a system involving a pair of linked keys. In this system, anything encoded with one key requires the other key to decrypt, and so on. When you encode a message using someone's public key, you know that only a recipient possessing the corresponding private key can read it.
Hashing
Hashing is a form of encryption that uses a specialized one-
way encryption key. If you hash a given volume of data, it
will produce a unique output string to that data, but it is
impossible to reconstruct the data from the output string. You
can re-encode the original data and compare it to the result string to verify it. This can serve as a type of error correction
in encoding. Hashing a message and providing that value to
your correspondents ensures that they can hash the message
themselves and compare the values. As long as the two output
strings match, recipients know the message is complete and
unaltered.