ENCRYPTION

ENCRYPTION

Encryption is the process of converting plain text data into unreadable cipher text to protect it from unauthorized access.

There are several types of encryption methods and they are; symmetric encryption, asymmetric encryption and hashing.

Symmetric encryption uses the same key for encryption and decryption (For example AES).

Asymmetric encryption uses a pair of keys: public key for encryption and a private key for decryption. (For example RSA).

Hashing is a one way encryption that produces a fixed size string of characters (For example SHA-256).

The advantages of encryption are as follows; encryption protects data from unauthorized access. Encryption ensures data integrity by detecting tampering. Encryption can verify the authenticity of data.

The disadvantages of encryption are as follows; encryption can be complex to implement and manage. Encryption can impact system performance. Managing encryption keys can be challenging.

Encryption finds application in several industries as follows; encryption secures online transactions such as online banking and e-commerce. Encryption protects sensitive data such as personal identifiable information (PII). Encryption secures communication such as email and messaging apps.

The future of encryption is based on the advances and developments in the following technologies; quantum resistant encryption that is developing encryption algorithms resistant to quantum computer attacks. Homo-morphic encryption that is enabling computations on encrypted data without decrypting it. Widespread application of encryption will further enable new advances in encryption technologies.

 

SOURCES:

  • Applied cryptography: protocols, algorithms and source code in C by Bruce Schneier.
  • Cryptography engineering: design principles and practical applications by Niels Ferguson, Bruce Schneier and Tadayoshi Kohno.
  • Serious cryptography: a practical introduction to modern encryption by Jean-Phillippe Aumasson.
  • Cryptography : theory and practice by Douglas R Stinson.
  • The joy of cryptography by Mike Rosulek.

 

 

 

NB: examples o encryption includes the following:

  • AES (advanced encryption standard; a widely used symmetric encryption algorithm.
  • RSA (Rivest-Shamir-Alderman); a popular asymmetric encryption algorithm.
  • SSL/TLS: a protocol that uses encryption to secure online communications.

 

  • Related Posts

    SOUND

    SOUND Sound is a form of energy that propagates as mechanical vibration or waves through a medium such as air, water or solids. Sound waves can be reflected, refracted and…

    HYPERVISOR

    HYPERVISOR A hypervisor is a virtual machine monitor (VMM) that abstracts physical hardware (CPU, RAM, storage, network etc.) and presents virtualized resources to multiple isolated guest operating systems simultaneously. There…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    SOUND

    • By admin
    • April 16, 2026
    • 10 views

    HYPERVISOR

    • By admin
    • April 16, 2026
    • 14 views

    COMPUTER NETWORK SWITCH

    • By admin
    • April 16, 2026
    • 13 views

    PURE VISION SENSOR

    • By admin
    • April 12, 2026
    • 48 views

    SOLID STATE BATTERY

    • By admin
    • April 12, 2026
    • 27 views

    SENSOR FUSION

    • By admin
    • April 12, 2026
    • 27 views