Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Various algorithms of Encryption

Author: Pgp Secure
by Pgp Secure
Posted: Dec 04, 2015

In technical terms, encryption is used to save the confidential data. Whether you are ordering something or your net banking account, all the data is saved on the internet via encryption. It is because to protect this crucial information, you need the latest technology. Moreover, Encryption helps in saving data from the hacking.

Before discussing about its algorithm, we must know about encryption. Encryption is refers to converting the simple data into a text that is not readable by anyone. Unreadable text is known as "cipher text." It is created by applying a technique or algorithm on the simple data. It is the effective method to achieve data security. On the internet, you will get the several PGP Encryption softwares that can save your data from unauthorized person.

Encryption is broadly divided into two types:-

1. Symmetric key Encryption

Key is refers to the algorithm that is used to convert the data into another form. In this, the encryption and decryption is done through same key. The key length in symmetric encryption is 160-512 bits.

2. Asymmetric Key Encryption

It is also known as Daffier Hellman encryption. You will get a pair of keys for the encryption and decryption. Public key is used for decrypting a message whereas private key for encrypting.

To secure the data from unwanted person, there are some encrypting algorithm are also available. Some of algorithms for encrypting data are discussed below:-

1. AES:-

AES is expanded as advanced encryption standard and it is an example of Symmetric key encryption. Approx 10 rounds are performs on 128 bit key and 14 rounds for 256 bit keys. Firstly, this encryption method is published in 1998.

2. RSA:-

RSA is designed by Ron Rivest, Adi Shami and Leonard Adleman. Generally, the key size of RSA algorithm is 1024 to 4096 bit. One of the best asymmetric key algorithms is RSA. This algorithm involves 4 steps that are key generation, key distribution, encryption and decryption.

3. Blowfish:-

It is a kind of symmetric key encryption that contains 32 to 448 bits key size. It split the data into blocks of 64 bits and encrypts them individually. For e-commerce applications, this algorithm is widely used.

4. DES:-

Data encryption standard or DES is designed by IBM. To encrypt the data, 16 rounds are performed in this algorithm. Triple DES, G-DES, DES-X and ICE are successors of the DES algorithm. Apart from this, the block size is of 64bits and key length is of 56 bits.

Hence, encryption algorithms are widely used in mobile phones, Bluetooth devices, ATM machines and much more areas.

About the Author

PGPSecure providing innovative technical solutions to our customers with encrypted BlackBerry devices.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Pgp Secure

Pgp Secure

Member since: Oct 20, 2015
Published articles: 5

Related Articles