Encryption relies on a range of systems and methods working together to protect data. These mechanisms include techniques, algorithms, protocols, and procedures.
Techniques describe the general method used to protect or transform data.
Symmetric Encryption: The same key is used to encrypt and decrypt the message.
➡️ Example: AES (Advanced Encryption Standard)
Asymmetric Encryption: A public key is used to encrypt, and a private key is used to decrypt.
➡️ Example: RSA (Rivest–Shamir–Adleman)
Hashing: A one-way function that turns data (like passwords) into a fixed-length hash.
➡️ Example: SHA-256
Salting: Adding random data to a password before hashing it to make the hash harder to crack.
Key Exchange: A method of securely sharing encryption keys over an insecure channel.
➡️ Example: Diffie-Hellman Key Exchange
Algorithms are the specific mathematical rules used to perform encryption or hashing.
AES – Used for symmetric encryption; fast and widely adopted.
RSA – Used for asymmetric encryption; secure for sending messages or sharing keys.
SHA-256 – A hashing algorithm; used in password protection and blockchain.
Elliptic Curve Cryptography (ECC) – A newer asymmetric method, secure with smaller key sizes.
Protocols are sets of rules that use encryption mechanisms to keep communication safe.
TLS/SSL – Secure websites (https://), email encryption, secure chat.
PGP (Pretty Good Privacy) – Used for encrypted emails.
HTTPS – Uses TLS to secure websites.
IPSec – Secures internet traffic at the network level.
WPA2/WPA3 – Wireless security protocols for encrypted Wi-Fi networks.
Procedures describe how encryption is applied or managed in real-world systems.
Encrypting data at rest – Protecting stored data (e.g., on a USB or hard drive).
Encrypting data in transit – Protecting data while it moves across networks.
Digital Signatures – Using hashing and asymmetric encryption to verify identity and message integrity.
Key management – Generating, storing, and distributing encryption keys securely.