top of page
Writer's pictureThe Karan Pargaien

How Encryption and Decryption works?

We all have something that we only want to show to our Boyfriend or Girlfriend. Well, what if you're sending any secret information to anyone and someone else track that message and read it. To stop these kind of things. We need Encryption.


What is Encryption?

Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. The message contained in an encrypted message is referred to as plaintext. In its encrypted, unreadable form it is referred to as ciphertext.


Basic forms of encryption may be as simple as switching letters. As cryptography advanced, cryptographers added more steps, and decryption became more difficult.



How Encryption Works?

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key. There are many types of algorithms, which all involve different ways of scrambling and then decrypting information.

See more in the above Video.



How Encryption Keys are Generated?

Keys are usually generated with random number generators, or computer algorithms. A more complex way that computers can create keys is by using user mouse movement to create unique seeds.



Search Encrypt Terms


  • Key: Random string of bits created specifically for scrambling and unscrambling data. These are used to encrypt and/or decrypt data. Each key is unique and created via algorithm to make sure it is unpredictable. Longer keys are harder to crack. Common key lengths are 128 bits for symmetric key algorithms and 2048 bits for public-key algorithms.

  1. Private Key (or Symmetric Key): This means that the encryption and decryption keys are the same. The two parties must have the same key before they can achieve secure communication.

  2. Public Key: This means that the encryption key is published and available for anyone to use. Only the receiving party has access to the decryption key that enables them to read the message.


  • Cipher: An algorithm used for encryption or decryption. It is a set of steps that are followed as a procedure to encrypt information. There are two main types of ciphers, block ciphers and stream ciphers.

  • Algorithm: An algorithm is the procedure that the encryption process follows. The specific algorithm is called the cipher, or code. There are many types of encryption algorithms. The encryption’s goal and level of security determines the most effective solution. Triple DES, RSA and Blowfish are some examples of encryption algorithms, or ciphers.

  • Decryption: The process of switching unreadable cipher text to readable information.

  • Cryptanalysis: The study of ciphers and cryptosystems to find weaknesses in them that would allow access to the information without knowing the key or algorithm.


Well. That's all in this article. This article is basically the compilation of some most asked questions by some of my friends about Encryption and Decryption and basically how they work. So, cheers with this.


Bye! Back with more interesting topics soon.

15 views0 comments

Recent Posts

See All

Comments


bottom of page