Encryption is the process of converting information, known as plaintext, into an alternative form known as ciphertext, which can only be accessed by authorized parties. Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key. The two main types of keys in cryptographic systems are symmetric-key and public-key (also known as asymmetric-key) . Encryption has long been used by militaries and governments to facilitate secret communication, and it is now commonly used in protecting information within many kinds of civilian systems.
Encryption plays an important role in securing many different types of information technology (IT) assets. It provides confidentiality, authentication, integrity, and nonrepudiation. Confidentiality encodes the messages content, authentication verifies the origin of a message, integrity proves the contents of a message have not been changed since it was sent, and nonrepudiation prevents senders from denying they sent the encrypted message. Encryption is an effective way to secure data, but the cryptographic keys must be carefully managed to ensure data remains protected, yet accessible when needed.
Encryption works by encoding plaintext into ciphertext, typically through the use of cryptographic mathematical models known as algorithms. To decode the data back to plaintext requires the use of a decryption key, a string of numbers or a password also created by an algorithm. Encryption takes plain text, like a text message or email, and scrambles it into an unreadable format called ciphertext.
Encryption is a vital component of digital transformation and a key data privacy protection strategy that keeps sensitive information out of the hands of unauthorized users. It is used to protect data from being stolen, changed, or compromised and is a cybersecurity measure that scrambles plain text so it can only be read by the user who has the secret code, or decryption key.