## Encryption Introduction

The word **Encryption** came from word **Kryptos**. Kryptos is a Greek word meaning of Kryptos is secret or hidden.

Encryption is the process in which we encrypt our data for protection from third parties. This is very essential thing in today’s technology. Even is early 1900 BC people were using encryption to send their messages but that technique was the different from now.

## What Is Encryption

If you are a organization providing services to your subscribers and want to protect your data from stealing it by others then you should go for encryption technique. So encryption makes your organization enable to send the data in more secure way. There are different kind of algorithm which are applied to data to make it encrypted.

As you can see in the figure there are some example of encryption algorithms. The speed of encryption and decryption of data is given in MBs there. You need to choose your appropriate algorithm. If you want faster speed of encryption then you should go with AES algorithm which encrypt your data with 183 Mbps and decrypt it in 178 MBps.

As we have discussed above encryption use the algorithm to protect your data from others So there are two types of Encryption Algorithm

**(1) Symmetric Algorithm**

**(2) Asymmetric Algorithm**

**(1) Symmetric Algorithm**

In symmetric algorithm there are basically two keys both are identical to each other but in electronics it is known as one key only because its identical for encrypt and decrypt the data.

To understand the symmetric algorithm we need to have the example of cristina and shiny.

In this example cristina wants to send the message to shiny. She write her message in a box and lock her message by using the padlock and send it. Now this message is encrypted and at the other side the shiny receive the message and open it from the key that he already have and this key is identical to cristina’s key. Shiny got this key before sometime from any physical medium. So shiny applied this key which is identical and read the message. Also shiny can send the reply of this message from his padlock.

There are two parts of this encryption algorithm

stream ciphers

Block ciphers

stream ciphers encrypt the bit of the message at a time while block ciphers as its name indicates it encrypt the message bits in the blocks.

**(2) Asymmetric Algorithm**

There are two different keys are available in the asymmetric algorithm. One is public key and the other one is private key.

again we are going to have the example of cristina and shiny to understand it more.

In this asymmetric algorithm cristina is having the public key and first cristina needs to ask shiny to send his open padlock from regular email. The shiny send his open padlock and cristina receive it then she type her secret message in it then she lock is by using her public key. Then she send the message that is encrypted to the shiny. The shiny use his private key and read the message.

The advantage of asymmetric algorithm is that we do not need to share our private key on the network so your key is safe. If someone get the copy of the private key then he or she can not open the message sent by cristina because of different padlock.

## Applications Of Encryption

SET TOP Boxes

Modems

Smart Cards

SIM Cards

ATM