The transfer or 'trot' of information or data in a secret code or any other form that cannot be easily understood by unauthorized or unintended users, called "encryption". The format of encrypted data is called 'Encryption Text'; unencrypted data is referred to as 'Plain Text'.
It is a way to improve the security and upgrading of information such as a message or file by jamming data in a manner that can only be read or decrypted 'by the intended person with the correct encryption key. The most effective means used to obtain a high degree of protection for sensitive data are the use of encryption software. Encrypting files or data does not mean that messages cannot be intercepted; only the content of the message is prevented from being visible to the unauthorized interceptor.
Decryption is the term used to convert encrypted data or information into the original format of presentation and understanding.
Use of encryption and decryption
The art of coding is as old as the communication system. It is interesting to read reports on wartime activities, where symbols have been used to communicate with troop positions, attack orders, warship sites etc. Simple coding elements include alphanumeric rotation and number substitution; however today's sophisticated computer algorithms work with these digital signals to rearrange parts of data.
The encrypted data can be decrypted using the correct algorithm key that undo the encryption algorithm.
Besides communications, data encryption is necessary for government jobs like the military and defense. In public use, many companies use encryption to prevent the loss or misuse of sensitive data and strategies. Buying online with cards is another area in which data encryption is heavily used.
However, some objections have been voiced against the use of robust encryption which makes itself unbreakable without the correct decryption keys. While the potential for cybercrime and terrorist activities floods the world, governments around the world face the possibility of evasion by illegal organizations by smoking encrypted data. They argue that data that cannot be decoded are more dangerous results. Efforts continue to persuade companies, institutions, and government agencies that use encrypted text to provide keys for decrypting data, which will be secured by the authorities and stored in a safe location for later use.
Types of encryption
On a large scale, encryption is of two types:
Symmetric Key Encryption – where encryption and decryption keys or algorithms are the same.
• Public key encryption – Here, the encryption key is open for anyone to use to encrypt messages. However, access to the decryption key will remain only with the intended recipient of the data.