Overview[1] [2]#

Encryption is the process of encoding Messages or data in such a way that only authorized parties have access.

Encryption provides Confidentiality of the data within a provided context

In Encryption, a Cipher is applied to a Message which results in the encrypted Ciphertext

In an Encryption scheme, the Message or information, referred to as plaintext, is encrypted using a Cipher, generating Ciphertext that can only be read if decrypted.

For technical reasons, an Encryption scheme usually uses a pseudorandom number generator by an algorithm.

Although it is possible to decrypt the message without possessing the key, the process requires large computational resources and large time frames which make the decryption impractical.

An authorized recipient (Bob) can easily decrypt the message with the key provided by the originator (Alice) to recipients, but not to unauthorized interceptors (Eve)

Alice And Bob's Problem#

This is a User Story where Alice wants to send Bob a message and Eve is eavesdropping in the Communication. This is why there is Encryption.



Bob needs two things to decrypt the Ciphertext:

Types Of Encryption#

There are two primary types of Encryption:

Encryption Scheme#

An Encryption Scheme is defined for Encryption Encryption operations.

Information security#

Encryption, by itself, can protect the confidentiality of data, but other techniques are still needed to protect the integrity and Non-Repudiation of a data. For Example verification might be performed by using of a Message Authentication Code (MAC) or a Digital Signature.

Encryption Context#

A Cipher that like Caesar Cipher may have worked in Caesar's time but offers no Security with today's tools.

More Information#

There might be more information for this subject on one of the following: