Using Encryption Algorithms That Can Be Used For Protecting Data

1403 Words Oct 11th, 2015 6 Pages
With the emergence of rapid growth in technology in our society today, there is an enormous amount of data that is being stored. However, an important question to ask is how is sensitive or important data being protected. One popular method that is currently used for protecting data is through encryption, which is “the process of converting data to an unrecognizable or ‘encrypted’ form.” 1 This process ensures that only authorized individuals have access to the confidential encrypted message. Encryption can be applied to files, folders, storage devices, or entire volumes. Although encryption can be used to protect a variety of data types, there are many different encryption algorithms that can be used. The most common and popular encryption algorithms that are used include hashing, symmetric methods, and asymmetric methods. It is important to comprehend the underlying terminology, in order to gain a deeper understanding of the different types of encryption algorithms that is a “component for electronic data security.” 5 Cryptology deals with the science and mathematics that is behind the procedures and methods of secret communication. This is not to be confused with the term encryption, which focuses on the actual ciphering, or altering of the message to a secret form. Whereas decryption is the process of decoding a distorted messages into something intelligible. A key is mathematical value, such as a password or complex mathematical computations that are used to…
Open Document