Difference between revisions of "Encryption"

From Market Ruler Help
Jump to: navigation, search
Line 1: Line 1:
In cryptography, '''Encryption''' is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. '''Encryption''' does not itself prevent interference, but makes it harder for the would-be interceptor to access the content.'''Encryption''' has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. Types of '''Encryption''' include symmetric-key  and public-key encryption.
+
In cryptography, '''Encryption''' is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. '''Encryption''' does not itself prevent interference, but makes it harder for the would-be interceptor to access the content. It is also used to protect data in transit. '''Encryption''' has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. Types of '''Encryption''' include symmetric-key  and public-key encryption. In response to '''Encryption''', cyber-interceptors and adversaries have developed new types of attacks.  
  
  
 
[[Category:Glossary]]
 
[[Category:Glossary]]
 
[[Category:Technical]]
 
[[Category:Technical]]

Revision as of 19:31, 22 March 2019

In cryptography, Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but makes it harder for the would-be interceptor to access the content. It is also used to protect data in transit. Encryption has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. Types of Encryption include symmetric-key and public-key encryption. In response to Encryption, cyber-interceptors and adversaries have developed new types of attacks.