• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

What is Encryption and its common types

By kamran | At December 14, 2019

Dec 14 2019

What is Encryption and its common types

Technology has made our lives easier and more efficient these days. But with the increase in the use of technology, it is important to protect your data from cyber-attacks. Organizations and individuals use different techniques and technologies to protect their data and one of them is encryption. Encryption is a process of using an algorithm to make it inaccessible or readable for an unknown person or unauthorized person.

Encryption is the easiest way to protect confidential information from unauthorized persons. Many organizations are using encryption to secure their data. Two common types of encryption are given below.

Symmetric cryptography or shared secret encryption

It is a common type of encryption which is used since the ancient Egyptian times; it uses a secret key called the shared secret to turn the data into unintelligible gibberish. To get access to the data the person needs the shared secret or code to unlock data. This is also called an encryption algorithm. The users having the code can change the key and result of encryption. It is called symmetric cryptography as the user on both ends uses the same key to lock and unlock the data.

The weakness in this system is that you need to share the secret key securely to the intended recipient. If any unauthorized person that can be a cybercriminal or enemy gets the secret key, they can access your data.

Public-key encryption or asymmetric cryptography

After facing the problem with sharing the secret key securely, different people made different interventions in the system of exchanging data. The need for a protected conversation or secured transaction without having any exchange keys was required. After a few years, a new method called the public key encryption or asymmetric cryptography was invented.

Asymmetric cryptography uses encryption that divides the key into two smaller keys. One of the keys is made public and one is kept private. The users encrypt the message with the recipient’s public key and the users on the other end of the recipient decrypt the data or message with their private key.

In this method, the user does not require the private key to send a secure message. To send the message you need the recipient’s public key. To the other end, a person with the private key can only access the data. These days the public key encryption is used behind every web server which offers a secure purchase. The transaction is encrypted without giving or taking the users a secret key.

Written by kamran · Categorized: Cyber security news

Primary Sidebar

Recents post

Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

Ransomware groups continue to … [Read More...] about Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

With confidential client … [Read More...] about New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

From ransomware attacks … [Read More...] about Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (29)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted
  • New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks
  • Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved